欢迎来到三一办公! | 帮助中心 三一办公31ppt.com(应用文档模板下载平台)
三一办公
全部分类
  • 办公文档>
  • PPT模板>
  • 建筑/施工/环境>
  • 毕业设计>
  • 工程图纸>
  • 教育教学>
  • 素材源码>
  • 生活休闲>
  • 临时分类>
  • ImageVerifierCode 换一换
    首页 三一办公 > 资源分类 > PPT文档下载  

    安全与可信security and trusted脆弱性安全 vs 结构性安全.ppt

    • 资源ID:6158488       资源大小:2.35MB        全文页数:65页
    • 资源格式: PPT        下载积分:10金币
    快捷下载 游客一键下载
    会员登录下载
    三方登录下载: 微信开放平台登录 QQ登录  
    下载资源需要10金币
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    安全与可信security and trusted脆弱性安全 vs 结构性安全.ppt

    1,安全与可信security and trusted脆弱性安全 vs.结构性安全Vulnerability vs.Structure攻防两端如何在结构性安全环境中寻求空间Space in the structural environment,http:/,2,摘要Summary,脆弱性安全Vulnerability-oriented security结构性安全Structural security结构性安全中的脆弱性Vulnerabilities in structures结构性威胁Structural threats,3,脆弱性安全Vulnerability-oriented security,4,脆弱性Vulnerabilities,弱口令 simple password病毒 virus操作系统漏洞 OS flaw协议漏洞 protocol flaw造成拒绝服务攻击的性能限制performance limitation防火墙配置不当 bad configuration of firewalls,5,面向脆弱性的安全Vulnerability-oriented security,防病毒系统 anti-virus system漏洞扫描系统 vulnerability scanner补丁管理系统 patch management system入侵检测系统 IDS防拒绝服务攻击系统 anti-DoS防火墙 Firewall多功能安全网关 UTM,6,PSPC需求驱动筐架Requirement Driven BaCaMeth,7,面向脆弱性的风险管理Vulnerability-oriented risk management,8,国家标准中的风险管理关系图Risk management elements in Chinese standard,9,最精简的风险管理要素模型3-element risk management model,10,2006 SC Awards,Best anti-malware solution Best Anti-spyware Best Anti-trojan Best Anti-virus Best Anti-worm Best Content Security Solution Best Anti-spam Best Email Content Filtering Best Email Security Best IM security Best Intellectual Property Protection Best Network Security Solution Best Wireless Security Best Enterprise Firewall Best Intrusion Detection Best Intrusion Prevention Best Desktop Firewall Best Remote Access Best VPN-SSL Best VPN-Ipsec Best Endpoint Security Solution Best Web Filtering Best Encryption,Best Identity Management Solution Best Password Management Best Authentication Best Single Sign-on Best Two-Factor Solution Best Unified Threat Solution Best Integrated Security Software Best Integrated Security Appliance Best Managed Security Service Best Email Managed Service Best Network Security Management Best Event Management Best Computer Forensics Best Policy Management Best Security Audit Best Security Management Tool Best Vulnerability Assessment and Remediation Best Patch Management Best Vulnerability Assessment,Source from:http:/,11,脆弱性安全的产业环境Vulnerability-oriented security industrial environment,威胁方Threat agents,厂商Provider,用户User,12,木桶原理的迷失Misleading of Cask Rule,误导将整体结构仅仅简化为防御结构不考虑防御纵深问题只考虑静态的结果状态没有成本观念 MisleadingOnly consider prevention structureNot consider deep preventionOnly consider static stateNot consider cost-effective,13,结构性安全Structural security,基本结构basic structure紧密结构 tight structure松散结构loose structure,14,访问控制的RM机制Reference monitor of access control,访问控制的RM机制是非常基本的安全结构Reference monitor of access control is a very basic security structure,15,RM机制有效的结构性条件Structural conditions of valid RM mechanism,三个条件不能被绕过不可篡改足够小,可以被证明,3 conditions of VRMCan not be bypassCan not be tamperedBe small enough,can be proved,16,Randomly GeneratedSymmetric Key(seed+PRNG),Alice,Publickey,Privatekey,Private key,Public key,Bob,密钥交换过程Key Exchange Process,17,紧密安全结构的代表可信计算Tight security structure Trusted Computing,http:/www.trustedcomputinggroup.org,可信的定义 Definition of trust可信就是,一个设备的行为是按照其预期目标和指定方式执行的Trust is the expectation that a device will behave in a particular manner for a specific purpose.一个可信平台应当至少提供三个基本特性:保护能力、完整性测量和完整性报告A trusted platform should provide at least three basic features:protected capabilities,integrity measurement and integrity reporting.(From section 4.1,TCG Architecture Overview 1.0),18,TCG的基石性原理Fundamental rule of TCG,信任根就像“公理”一样,是信任的基础。在PC系统中,常常用硬件芯片实现。Roots of trustIn TCG systems roots of trust are components that must be trusted because misbehavior might not be detected.,信任链则是信任传递的机制。常常采用密码技术。Chains of trustTransitive trust also known as“Inductive Trust”,is a process where the Root of Trust gives a trustworthy description of a second group of functions.,19,一个包含TPM的PCReference PC platform containing a TCG TPM,20,TCG 可信平台模块TCG Trusted Platform Module(TPM),一个可信平台常常拥有三个可信根There are commonly three Roots of Trust in a trusted platform测量可信根 root of trust for measurement(RTM)存储可信根 root of trust for storage(RTS)报告可信根 root of trust for reporting(RTR),21,证明协议和消息交换Attestation protocol and message exchange,22,TPM 存储可信根的体系结构TPM Root of Trust for Storage(RTS),23,TPM 部件体系结构TPM component architecture,24,TCG 软件分层TCG software layering,25,可信平台的生命周期The trusted platform lifecycle,26,可信平台上的用户认证User authentication using trusted platforms,27,可信平台上的用户认证User authentication using trusted platforms,28,经典的四角模型The classical four corners model,29,四角模型的可信平台实现Detailed TP deployment architecture,30,TCG对于可信计算平台的划分8 categories of Trusted platform,体系结构Architecture,TPM,移动设备Mobile,客户端PC Client,服务器Server,软件包Software Stack,存储Storage,可信网络连接Trusted Network Connect,31,TCG的IWG和TNC的对应关系the IWG and TNC architecture,32,TNC体系结构TNC architecture,33,TNC体系结构下的消息流Message flow between components,34,拥有TPM的TNC体系结构The TNC architecture with the TPM,35,思科的自防御网络体系Ciscos self-defending network,36,思科的自防御网络体系Ciscos self-defending network,37,松散安全结构的代表框架和方案Loose security structure Framework,松散结构中的各个部件关联关系,常常靠人的集成来实现The connection among the components of loose structure is always integrated by human.松散结构常常表现为框架Framework技术框架Technology framework管理体系Management systemISO27001,ISO20000,etc.,38,39,技术功能是PDR的衍生PDR can express technology framework,40,检测能力是松散技术结构的关联要素Detection make the loose structure tight,攻击者不得不面对越来越多的Attackers have to face more入侵检测 IDS漏洞扫描 scanner应用审计系统 Application auditing system日志系统 log system蜜罐 honey pot取证系统 forensic system监控平台 monitoring platform等等 etc.,41,一个信息安全管理体系的结构Structure of a ISMS(modified ISO27001),42,结构性安全中的脆弱性Vulnerabilities in structures,43,你对刚才阐述的结构性安全有什么感觉?Whats your feeling about structural security?,复杂 complex怀疑其完备性 concern about the completion成本 cost蠢人永远有 stupid guys are there,44,不要被“结构性安全”给忽悠了!Do not be misled by structural security,不要被“结构性安全”给忽悠了!脆弱性安全和结构性安全并不是对立的,也不是两个发展阶段;脆弱性安全也有结构,结构性安全也有脆弱性。Do not be misled by structural securityVulnerability-oriented security also has structureStructural security also has vulnerabilities,45,借助非技术环节来侵害技术结构Find vulnerabilities from non-technology parts,Randomly GeneratedSymmetric Key(seed+PRNG),Alice,Publickey,Privatekey,Private key,Public key,Bob,46,借助非技术环节来侵害技术结构Find vulnerabilities from non-technology parts,Randomly GeneratedSymmetric Key(seed+PRNG),Alice,Publickey,Privatekey,Private key,Public key,Bob,Private key,Public key,Carl,线路的透明插入,可以完成对于加密通信的嗅探攻击,47,借助非技术环节来侵害技术结构Find vulnerabilities from non-technology parts,Randomly GeneratedSymmetric Key(seed+PRNG),Alice,Publickey,Privatekey,Private key,Public key,Bob,Private key,Public key,Carl,48,结构性安全的局限性Limitation of structural security,结构是在环境中的、有边界的environment and boundary,49,在生命周期中寻找弱点 Find vulnerabilities along the lifecycle,厂家的生产环节常常会埋有后门back doors embedded during manufacturing没有一个系统是完美的No perfect system,50,在结构的时序中寻找突破Find vulnerabilities through time sequence,以文档保密系统为例Sample:Document protection system文档的生成环节最可能存在漏洞Vulnerabilities during creating documentation,51,结构性安全的局限性Limitation of structural security,结构是在环境中的、有边界的environment and boundary在不同阶段、不同人手中保持安全很困难different phases and organizations,52,在人性中寻找弱点Find vulnerabilities from human behavior,社交工程攻击Social Engineering隐私保护Privacy protection自由倾向Anti-DRM懒惰Lazy,53,结构性安全的局限性Limitation of structural security,结构是在环境中的、有边界的environment and boundary在不同阶段、不同人手中保持安全很困难different phases and organizations人把科学变成了艺术Human transform science to art,54,结构本身可能就有问题Find vulnerabilities from structure itself,55,对于AR/PEP/PDP的伪装,可能打破整个结构every role may be spoofed所有看似漂亮的结构,其性能和可用性问题可能会非常严重,会轻易被拒绝服务攻击击垮Most beautiful structures have performance and availability problems and may be easy to be kick down by DoS.那么多传统攻击方式,可能有的还有效Some traditional attacks are still effective,结构本身可能就有问题Find vulnerabilities from structure itself,56,结构性安全还要继续博弈We are still in the game,怎么博弈?How to Play the game?你了解对方的结构吗?Do you know the structure of all players?你了解对方了解多少自己的结构吗?Do you know“how much have the other player known about your structure”?,57,结构性威胁Structural threats,知识、资源和原则Knowledge,Resources and Principles,58,知识Knowledge,寻求对于系统更深层次技术结构的研究Who know lower?寻求对于系统宏观结构的了解Who know the macro-structure better?寻求对于具体对象的全面了解How many details do you know?,59,资源Resources,从分布式拒绝服务攻击到僵尸网络,掌握具有结构和组织的攻击体Botnet is a sample of structural software organization for attacking在时序上组成结构,非常有利于攻击Time sequence spreading is a good thinking of structural attack,60,结构的一些关键字Key words of structure,BusinessDistributionHierarchyTime sequenceLife-cycleManagementOrganizationRegularProcess ControlValue,业务分布式层次时序生命周期管理组织制度过程控制价值,61,流程化的结构思路Process-oriented structure,process,input,output,Process owner,operator,Infra-structure,Knowledgebase,LOGArchive,Processimproving,Monitor,62,原则Principles,安全没有百分之百 No 100%Security安全相对性的三个原则 3 security relativity rule生存原则 survival rule风险原则 Risk rule保镖原则 bodyguard rule,自身完备性要求Perfective requirement,63,总结 Conclusion,脆弱性安全Vulnerability-oriented security结构性安全Structural security结构性安全中的脆弱性Vulnerabilities in structures结构性威胁Structural threats,64,总结:一个可以持续研究下去的课题Conclusion:A good problem to keep approaching,脆弱性和结构性 Vulnerability-oriented vs.structural,攻击和防守 defend vs.attack,65,谢谢Thanks,

    注意事项

    本文(安全与可信security and trusted脆弱性安全 vs 结构性安全.ppt)为本站会员(sccc)主动上传,三一办公仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一办公(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    备案号:宁ICP备20000045号-2

    经营许可证:宁B2-20210002

    宁公网安备 64010402000987号

    三一办公
    收起
    展开