1 1 1 Trusted Systems and Trojan Horse Done by : Hany Nasser Supervised by : PhD Nabil Hamdy
2 2 Trusted Systems Systems used to enhance the ability to defend against intruders and malicious programs. based on levels of security .
3 3 Multilevel Security When multiple categories or levels of data are defined, the requirement is referred to as multilevel security . Typically use Mandatory Access Control. Primary Security Goal: Confidentiality (ensures that information do not flow to those not cleared for that level).
4 Security Goal of MLS There are security classifications or security levels Subjects have security clearances Objects have security classifications Example of security levels Top Secret Secret Confidential Unclassified In this case Top Secret > Secret > Confidential > Unclassified
5 5 5 Data Access Control Through the user access control procedure (log on), a user can be identified to the system. Associated with each user, there can be a profile that specifies permissible operations and file accesses. The operating system can enforce rules based on the user profile.
6 6 6 Data Access Control General models of access control: Access matrix Access control list Capability list
7 7 7 Data Access Control Access Matrix: Basic elements of the model Subject Object Access right
8 8 8 Data Access Control Access Matrix
9 9 9 Data Access Control Access Control List: Decomposition of the matrix by columns
10 10 10 Data Access Control Access Control List For each object, An access control list lists users and their permitted access right. The list may contain a default or public entry.
11 11 11 Data Access Control Capability list: Decomposition of the matrix by rows
12 12 12 Data Access Control Capability list A capability ticket specifies authorized objects and operations for a user. Each user have a number of tickets. Capabilities are not forgeable.
13 13 13 The Concept of Trusted Systems Multilevel security Definition of multiple categories or levels of data A multilevel secure system must enforce: No read up No write down
14 14 14 The Concept of Reference Monitor
15 15 15 The Concept of Reference monitor Reference Monitor Controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects on basis of security parameters The monitor has access to a file (security kernel database) The monitor enforces the security rules (no read up, no write down)
16 16 16 The Concept of Reference Monitor Properties of the Reference Monitor Complete mediation Isolation Verifiability
17 17 Trojan Horse It is a type of malware (malicious software) designed to provide unauthorized, remote access to a user’s computer. Trojan horses do not have the ability to replicate themselves like viruses. With the help of Trojan, an user can get access to the Trojan horse infected computer and would be able to access the data.
20 20 Indications of Trojan Attack Browser redirects to unknown pages. Anti virus is disabled. Strange pop ups or chat messages appear on the system. The computer shuts down automatically. Ctl+Alt+Del stops working. Printer prints documents automatically.
21 21 Examples of Trojan Net bus Sub seven Y3K remote administration tool Back Orifice Beast Zeus The Black hole Exploit kit Flashback Trojan
22 22 How to avoid being infected ? Do not surf or download anything from stranger website. Do not open the unexpected attachments on emails. We need an antivirus to protect our computer from being infected.
23 23 References Cryptography And Network Security, 4 th Edition by William Stallings. Computer Security, 2 nd edition by Dieter Gollman. Specifications of multi-level security research by Daryl McCullough.