0% found this document useful (0 votes)
5 views21 pages

CS 3

The document outlines various security policies and models in cyber security, including Mandatory Access Control (MAC) and Discretionary Access Control (DAC), along with their definitions, examples, strengths, and weaknesses. It discusses the Bell-LaPadula Model focused on confidentiality, the Biba Model aimed at integrity, and the Clark-Wilson Model which emphasizes business integrity through well-formed transactions and separation of duties. Additionally, it highlights the importance of availability policies to ensure resources are accessible to authorized users.

Uploaded by

Anvesh Pathak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views21 pages

CS 3

The document outlines various security policies and models in cyber security, including Mandatory Access Control (MAC) and Discretionary Access Control (DAC), along with their definitions, examples, strengths, and weaknesses. It discusses the Bell-LaPadula Model focused on confidentiality, the Biba Model aimed at integrity, and the Clark-Wilson Model which emphasizes business integrity through well-formed transactions and separation of duties. Additionally, it highlights the importance of availability policies to ensure resources are accessible to authorized users.

Uploaded by

Anvesh Pathak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

2/1/2026

BITS Pilani
Pilani Campus

SS ZG681/ SE ZG681
Cyber Security
(Merged - SEZG681/SSZG681)
Vishal Gupta
Department of Computer Science and Information Systems
BITS Pilani Birla Institute of Technology and Science
Pilani Campus
Pilani Campus, Pilani Cyber Security – CS-3

1
2/1/2026

Outline Overview

What is a Security Policy?


•Definition: A security policy is a statement that defines what is allowed and what is
• Overview forbidden in a computer system.
•It defines what security means for that system — without it, you can’t tell if
– Mandatory versus discretionary controls something is “secure” or “insecure”.
– What is a confidentiality model
Two parts:
• Bell-LaPadula Model • Security Goals – what you are trying to achieve (e.g., confidentiality, integrity,
– General idea availability).
– Description of rules • Rules – specific restrictions or permissions to achieve those goals.

• Tranquility
Example
•Policy: “Only HR staff can access employee salary records.”
•Mechanism: Password-protected HR portal and access control lists.
•If a finance intern accesses salary data without permission → policy violation.

2
2/1/2026

Security Policy Types of Security Policies

• Policy partitions system states into: • Military (governmental) security policy


– Authorized (secure) – Policy primarily protecting confidentiality
• These are states the system can enter
• Commercial security policy
– Unauthorized (nonsecure)
– Policy primarily protecting integrity
• If the system enters any of these states, it’s a
security violation • Confidentiality policy
• Secure system – Policy protecting only confidentiality
– Starts in authorized state • Integrity policy
– Never enters unauthorized state – Policy protecting only integrity

3
2/1/2026

What is Mandatory Access Example of MAC


Control (MAC)?
- Access decisions based on fixed policies
- Military environment:
- Controlled by system administrator/security policy, and not by individual • 'Secret' file → only users with 'Secret' or higher clearance
users. • 'Top Secret' officer → cannot post info into a 'Confiden al' file
- Characteristics: Centralized, rigid, very secure
- Uses security labels (Top Secret, Secret, Confidential)

- Enforced through formal models like Bell-LaPadula

How it works:

•Every subject (user/process) and object (file/resource) is assigned a security


label (e.g., Top Secret, Secret, Confidential, Unclassified).

•Access rules are based on these labels, using models like Bell-LaPadula
(confidentiality) or Biba (integrity).

4
2/1/2026

What is Discretionary Access Example of DAC


Control (DAC)?
- Access decisions made by owner of the resource - Company environment:
- Uses Access Control Lists (ACLs) or capability tables • Alice creates a document → grants Bob read/write access
- Example: UNIX/Linux file permissions (rwx) • Alice denies access to Charlie
- Flexible, user-friendly, less secure - Similar to Google Docs sharing options

5
2/1/2026

Key Differences Confidentiality Policy


Aspect MAC DAC

Control Central authority/policy Owner of data


Flexibility Rigid Flexible
• Goal: prevent the unauthorized disclosure of
Security High Lower information
Common Use Military, govt Businesses, personal – Deals with information flow
systems
Example Rule 'Secret' cannot read 'Top File owner grants access
– Unauthorized alteration of information is
Secret' secondary
• Multi-level security models are best-known
Summary examples
- MAC: Security-first, rigid, system decides
- DAC: User-friendly, flexible, owner decides – Bell-LaPadula Model basis for many, or most,
- Real-world systems often use a hybrid of both of these

6
2/1/2026

Bell-LaPadula Model, Step 1 Example

• Security levels arranged in linear ordering security level subject object


– Top Secret: highest Top Secret Tamara Personnel Files
– Secret Secret Samuel E-Mail Files
– Confidential Confidential Claire Activity Logs
– Unclassified: lowest
Unclassified Bob Telephone Lists
• Levels consist of security clearance L(s)
• Tamara can read all files
– Objects have security classification L(o)
• Claire cannot read Personnel or E-Mail Files
• Bob can only read Telephone Lists

7
2/1/2026

Reading Information Writing Information

• Information flows up, not down • Information flows up, not down
– ―Reads up‖ disallowed, ―reads down‖ allowed – ―Writes up‖ allowed, ―writes down‖ disallowed
• Simple Security Condition (Step 1) • *-Property (Step 1)
– Subject s can read object o iff, L(o) ≤ L(s) and s – Subject s can write object o iff L(s) ≤ L(o) and s
has permission to read o
has permission to write o
• Note: combines mandatory control (relationship of • Note: combines mandatory control (relationship of
security levels) and discretionary control (the security levels) and discretionary control (the
required permission) required permission)
– Sometimes called ―noreads up‖ rule – Sometimes called ―nowrites down‖ rule

8
2/1/2026

Basic Security Theorem, Step 1 Example Scenarios

Military Context
A soldier with “Secret” clearance:
• If a system is initially in a secure state, and Can read: “Secret” or “Confidential” documents.
every transition of the system satisfies the Cannot read: “Top Secret” documents (No Read Up).
Cannot write: to “Confidential” or “Unclassified” systems (No Write Down).
simple security condition (step 1), and the
*-property (step 1), then every state of the
Corporate Context
system is secure In a company, suppose levels are:
Executives (High), Managers (Medium), Interns (Low).
Executives cannot send a confidential merger plan to interns (No Write Down).
Interns cannot access board meeting minutes (No Read Up).

9
2/1/2026

Strengths and Weaknesses Integrity Policies

Integrity Policies
Strengths •Goal: Protect data from unauthorized modification.
•Focus: Who can change the data and how it can be changed.
• Strong protection of confidentiality.
• Well-suited for environments where secrecy is critical (military, government). Formal Models:
• Simple and mathematically provable. •Biba Model – “No Write Up, No Read Down”
• Prevents low-integrity subjects from corrupting high-integrity data.
Limitations • Prevents contamination by reading untrusted data.
• Does not protect integrity (data correctness) or availability. •Clark-Wilson Model – More business-oriented
• For example, a user could still corrupt data as long as rules are not • Uses “well-formed transactions” and “separation of duties”.
broken.
• Too rigid for real-world businesses, where information sharing across levels is Example:
necessary. •Banking system:
• “No Write Down” can block legitimate workflows. (e.g., analysts wanting to • Only authorized transactions can change account balances.
share summarized reports with the public). • Clerks enter data, but managers approve transactions.

10
2/1/2026

Introduction to the Biba Model Core Principles

• The Biba Integrity Model (developed by Kenneth Biba in 1977) is a formal state-transition Biba uses integrity levels (similar to security clearance levels in Bell-LaPadula).
model that focuses on data integrity rather than confidentiality (unlike Bell-LaPadula).
Two main rules define it:
• Goal: Prevent corruption of sensitive or important data by unauthorized or lower-integrity
sources. Simple Integrity Property (No Read Down)
A subject at a higher integrity level cannot read data at a lower integrity level.
• Principle: Ensure that information is trustworthy, accurate, and reliable. Reason: Prevents contamination of high-trust processes with untrusted/dirty data.

*-Integrity Property (No Write Up)


A subject at a lower integrity level cannot write to data at a higher integrity level.
Reason: Prevents untrusted users/programs from corrupting high-integrity data.

11
2/1/2026

Intuition with an Analogy Examples

Think of a hospital system: Example 1: Financial Transactions

Doctors’ records (high integrity) High integrity: Bank’s core transaction database.
Nurses’ reports (medium integrity) Medium integrity: Customer service staff inputs.
Patient’s self-entered notes (low integrity) Low integrity: Customer’s online forms.

Using Biba: Application:

Doctors (high integrity) cannot read patient’s self-entered notes (low integrity) → avoids
medical decisions based on unreliable info. A customer (low) cannot directly update the core database (high).
Patients (low integrity) cannot overwrite doctors’ records (high integrity). A bank officer (high) cannot rely on customer-submitted forms (low) without validation.

12
2/1/2026

Examples Examples

Software Development Military System

High integrity: Source code repository (production branch). High integrity: Strategic command data.
Medium integrity: Developer’s tested code. Medium integrity: Field officer reports.
Low integrity: User feedback or bug reports. Low integrity: Open-source intelligence (social media, rumors).

Application: Application:

A junior intern (low) cannot directly commit to the production branch (high). Commanders (high) cannot make decisions directly based on Twitter reports (low).
A senior developer (high) should not base fixes solely on unverified bug reports (low). Field soldiers (low/medium) cannot alter top-secret strategic documents (high).

13
2/1/2026

Examples Advantages and Limitations

Operating Systems Advantages


Protects data reliability and correctness.
High integrity: Kernel files. Prevents malicious or accidental corruption of important resources.
Medium integrity: System applications. Useful in financial systems, healthcare, and defense where integrity matters most.
Low integrity: User applications.

Application: Limitations
Can be too strict → makes prac cal work harder (e.g., some mes high-level users do need to
A user program (low) cannot modify kernel files (high). read low-level data).
Kernel (high) cannot use outputs from untrusted user programs (low) without sanitization. Often implemented with trusted intermediaries (e.g., validation, sanitization, filters) to
bridge the gap.

14
2/1/2026

Clark-Wilson Model Key Ideas

Well-Formed Transactions (WFTs)


• Proposed by David Clark and David Wilson in 1987. • Users cannot directly manipulate data.
• Instead, they must use programs (applications) that enforce rules.
• Unlike Biba (which was mathematical and abstract), the Clark-Wilson model is practical • Example: In a bank, you cannot directly edit an account balance. You must
and focuses on commercial systems such as banks, accounting, and business processes. perform a withdrawal or deposit transaction.

• Goal: Ensure that data in a system remains consistent, correct, and valid according to Separation of Duties (SoD)
business rules. • No single user should have full control over a critical process.
• Example: In accounting, one person writes checks, another approves them.
• It defines integrity as the prevention of unauthorized users making changes and
authorized users making improper changes.
Certification & Enforcement Rules
• Certain rules govern how the system operates:
• Certification Rules (C-Rules): Ensure that programs correctly implement
business rules.
• Enforcement Rules (E-Rules): Ensure that only authorized users use
certified programs.

15
2/1/2026

Core Components Certification and


Enforcement Rules
The model introduces three main entities: Certification Rules (C-Rules)
• CDIs (Constrained Data Items): Data that must always remain valid (e.g., 1. C1: All TPs must be certified to ensure they transform CDIs from one valid state
account balances). to another.
• UDIs (Unconstrained Data Items): External inputs that are not yet validated 2. C2: For each TP, a list of authorized users must be defined.
(e.g., customer input forms). 3. C3: All UDIs must be transformed into CDIs by a TP.
• TPs (Transformation Procedures): Trusted programs that manipulate CDIs in a 4. C4: Integrity must be verifiable — system must log transactions for auditing.
controlled manner (e.g., deposit or withdrawal functions).
Enforcement Rules (E-Rules)
1. E1: The system must enforce certification rules.
2. E2: The system must ensure only authorized users can run TPs on specific
CDIs.
• This enforces separation of duties.

16
2/1/2026

Examples Examples
Example 1: Banking System
Example 3: Airline Reservation System
• CDI: Customer’s account balance.
• CDI: Seat availability database.
• UDI: Customer’s deposit slip.
• UDI: Customer’s ticket booking request.
• TP: “Deposit Money” program.
• TP: Reservation program.
• Rule Application:
• Rule: Only certified TP can update seat database. Customer cannot directly
• Customer cannot directly change balance (no free edit).
mark a seat as “booked.”
• Deposit slip (UDI) is verified, then TP updates balance (CDI).
• Logs record the transaction (audit trail).

Example 2: Inventory Management


• CDI: Stock levels in warehouse database.
• UDI: Supplier delivery form.
• TP: “Update Stock” function.
• SoD:
• One employee enters delivery info.
• Another employee approves the stock update.
This prevents fraud (e.g., someone inflating stock levels to cover theft).

17
2/1/2026

Advantages and Limitations Availability

Advantages
• Practical: Directly applicable to real-world business environments. • X set of entities, I resource
• Fraud Prevention: Separation of duties stops insider threats. • I has availability property with respect to X if all
• Auditability: Logging ensures accountability.
• Data Consistency: Transactions enforce valid states. x  X can access I
• Types of availability:
Limitations
• Requires trusted software (TPs) — if these are flawed, the model fails. – traditional: x gets access or not
• More complex than Biba or Bell-LaPadula. – quality of service: promised a level of access (for
• High administrative overhead (certification, enforcement, auditing). example, a specific level of bandwidth) and not meet it,
even though some access is achieved
In short:
The Clark-Wilson model ensures integrity by enforcing:
• Well-formed transactions (no free editing of data).
• Separation of duties (no one person controls everything).
• Certification + Enforcement rules (policies + mechanisms).
• It is the go-to model for business/commercial integrity protection.

18
2/1/2026

Availability Policies Types of Access Control

Availability Policies • Discretionary Access Control (DAC, IBAC)


•Goal: Ensure resources are available to authorized users when needed. – individual user sets access control mechanism to allow
•Focus: Prevent denial of service (DoS), resource starvation.
or deny access to an object
Example: • Mandatory Access Control (MAC)
•Web hosting policy:
“System must be up 99.9% of the time. Any DoS attempts will trigger firewall
– system mechanism controls access to object, and
blocks.” individual cannot alter that access
• Originator Controlled Access Control (ORCON)
– originator (creator) of information controls who can
access information

19
2/1/2026

Question Answer Part 1

• Policy disallows cheating • Bill cheated


– Includes copying homework, with or without – Policy forbids copying homework assignment
permission – Bill did it
• CS class has students do homework on computer – System entered unauthorized state (Bill having a copy
of Anne’s assignment)
• Anne forgets to read-protect her homework file • If not explicit in computer security policy,
• Bill copies it certainly implicit
• Who cheated? – Not credible that a unit of the university allows
something that the university as a whole forbids, unless
– Anne, Bill, or both? the unit explicitly says so

20
2/1/2026

Answer Part 2

• Anne didn’t protect her homework


– Not required by security policy
• She didn’t breach security
• If policy said students had to read-protect
homework files, then Anne did breach
security
Thanks
– She didn’t do this

21

You might also like