Sunteți pe pagina 1din 18

Firewall Trusted System

Subject:-Computer Network And Security


Name:-Tanvi K. Modi
Er No:-176270307523
Division:-5th B
OUTLINE
• What is Firewall.
• What is Trusted System.
• Data Access Control.
• Access matrix.
• Access control list.
• Capability list.
• Concept of Trusted System.
• The Reference Monitor Concept.
What Is Firewall?
• A firewall is a network security system designed to prevent
unauthorized access to or from a private network.
• Firewalls can be implemented as both hardware and software, or a
combination of both.
• Network firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks connected
to the Internet, especially intranets.
• All messages entering or leaving the intranet pass through the
firewall, which examines each message and blocks those that do not
meet the specified security criteria.
What is Trusted System?
• One way to enhance the ability of a system to defend against
intruders(hacker) and malicious programs(malware) is to implement
trusted system technology.
• It means in trusted system there is one type of authentication for any
user to use that data.
Data Access Control.
• Through the user access control procedure (log on), a user can be
identified to the system
• Associated with each user, there can be a profile that specifies
permissible operations and file accesses
• The operation system can enforce rules based on the user profile.
• For example, it may be permissible for anyone administration to
obtain a list of company employees, but only selected individuals may
have access to salary information.
Data Access Control.
• This decision will depend on not only user’s identity but also on the
specific parts of the data being accessed and even on the information
already known to the user.
• The access control have three general models::
1. Access matrix.
2. Access control list.
3. Capability list.
Data Access Control.
1. Access matrix.
Data Access Control.
Access matrix.
• Basic elements of the model:
• Subject: An entity (typically a process) capable of accessing objects, the
concept of subject equates with that of process.
• Object: Anything to which access is controlled, eg files, portions of files,
programs, memory segments.
• Access right: The way in which an object is accessed by a subject, eg. read,
write and execute.

One axis of an access matrix consists of identified subjects that may


attempt data access, the other lists objects that may be accessed, & each entry in
the matrix indicates the access rights of that subject for that object.
Data Access Control.
Access control list.
• Decomposition of the matrix by columns.
Data Access Control.
Access control list.

• An access control list lists users and their permitted access right.
• The list may contain a default or public entry.
Data Access Control.
Capability list.
• Decomposition of the matrix by rows.
Data Access Control.
Capability list.
• A capability ticket specifies authorized objects and operations for a
user.
• Each user have a number of tickets.
Concept of Trusted System.
• A widely applicable approach for protection of data and resources is
based on levels of security.
• This is commonly found in military, where information is categorized
as unclassified (U), confidential (C), secret (S), top secret (TS), or
beyond.
• This concept is equally applicable in other areas, where information
can be organized into categories and users can be granted clearances to
access certain categories of data.

When multiple categories or levels of data are defined, the


requirement is referred to as multilevel security.
Concept of Trusted System.
• The general statement of the requirement for multilevel security is that a
subject at a high level may not convey information to a subject at a lower or
non-comparable level unless that flow accurately reflects the will of an
authorized user.
• For implementation purposes, this requirement is in two parts and is simply
stated.
• A multilevel secure system must enforce the following:
1. No read-up: A subject can only read an object of less or equal
security level. This is referred to in the literature as the simple security
property.
2. No write-down: A subject can write into an object of greater or
equal security level. This is referred to as the *property.
These two rules, if properly enforced, provide multilevel
security.
The Reference Monitor Concept.
• For a data processing system, the approach that has been taken, and
has been the object of much research and development, is based on the
reference monitor.
• The reference monitor not only is responsible for assuring that the
references are authorized to access shared resources object but to also
to assure that the references is right kinds.(i.e. read and write etc.)
• Controlling element in the hardware and operating system of a
computer that regulates the access of subjects to objects on basis of
security parameters.
• The monitor has access to a file, known as security kernel database.
The Reference Monitor Concept.
• Properties of the Reference Monitor as given below:
1. Complete mediation: Security rules are enforced on every access.(i.
e. where the file opens)
2. Isolation: The reference monitor and database are protected from
unauthorized modification.
3. Verifiability: The reference monitor’s correctness must be provable.
THANK YOU

S-ar putea să vă placă și