Index > Authentication > 2021-02-01: Module 1: Trust and Security Models

Module 1: Trust and Security Models

There is a huge amount of raw information in this module.

Scenario: You are entering your login credentials to a website on your phone.

You need to trust:

But trust with what? There are different components of trust.

Trust Anchor - something for which trust is assumed, not derived.

Classic trust models

“Objects” of Trust

How to verify trustworthiness?

The “Trusted Computing Base” (TCB)

Not every component of a computer can be trusted. So, we can isolate and trust the security components.

Note that trust does not make something secure

The TCB should be separated from the rest of the computer by a security perimeter. Access must be protected by a reference monitor. This is typically implemented as a security kernel in an OS.

Apple uses a “secure enclave”

What does a security kernel do?

Rings and Domains

A domain is a set of objects that a given subject has access to. Modern OS’s use “protection rings” to show domain boundaries. (It’s not just user and kernel space).

My chatbot process (the subject) asks the reference monitor for its database file. The kernel does the actual reading from the disk, and returns the data - but only if the process has the correct permissions to access the files it asked for.

The Orange Book

Trusted Computer System Evaluation Criteria

The book sets forth criteria for evaluating the security of an operating system. One such rule requires the presence of a reference monitor, which controls subjects access to resources.

Levels:

During this section, Prof. opened a jar for his daughter. And the zoom chat did rejoice.

Assurance

Assurance mechanisms guarantee the previous requirements are fulfilled, and that the trusted system is validated as secure/not secure.

Assurance can come from multiple mechanisms:

Prof. did not expand on those points.

“Is it a zero or a one - that’s security. How do we know it is what we think it is? That’s assurance.” - Prof.

What’s a “Separation Kernel”?

It has something to do with VMs.

State Machines

Reference Monitors are NEAT

Recall, the reference monitor is the guardian between an applicant (like a userland process) and some protected resource (like OS syscalls)

Terms

What do these mean? Hopefully we find out next class.

Some quick review on due dates and assignments

Module 1 quiz, due Feb. 13th. 2 hours allocated.

There is a second discussion post:

Lectures are on Monday, group work is on Wednesdays.

There’s also a list of videos that should be watched by Saturday.

Source summary 1 due Feb 13th.

TL;DR: Go scour every inch of MyCourses for due dates, because they’re everywhere.


Index > Authentication > 2021-02-01: Module 1: Trust and Security Models