50
CPSC 257: Information Security in the Real World Ewa Syta March 3, 2016 CPSC 257 March 3, 2016 1 / 50

CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

CPSC 257: Information Securityin the Real World

Ewa Syta

March 3, 2016

CPSC 257 March 3, 2016 1 / 50

Page 2: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

1 Authorization

CPSC 257 Outline March 3, 2016 2 / 50

Page 3: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Authorization

CPSC 257 Authorization March 3, 2016 3 / 50

Page 4: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Authorization

Authorization - Are you allowed to do that?

• The second component of access control.

• Follows authentication.

Essential to integrity, confidentiality but also accountability.

CPSC 257 Authorization March 3, 2016 4 / 50

Page 5: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Lampson’s Access Control Matrix

Subjects (users) index the rows.Objects (resources) index the columns

r - read, w - write, x - execute

CPSC 257 Authorization March 3, 2016 5 / 50

Page 6: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Are you allowed to do that?

Access control matrix has all relevant information to answer thisquestions.

• Could be 100’s of users, 10,000’s of resources.• Then matrix with 1,000,000’s of entries.

• How to manage such a large matrix?• We need to check this matrix before access to any resource by

any user.

• How to make this e�cient/practical?• Split it into smaller pieces: by rows or by columns.

CPSC 257 Authorization March 3, 2016 6 / 50

Page 7: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Access Control Lists (ACLs)

ACL stores access control matrix by column.

• ACL for insurance data in blue.

rx rx r ⎯ ⎯

rx rx r rw rw

rwx rwx r rw rw

rx rx rw rw rw

OS Accounting

program Accounting

data Insurance

data Payroll

data

Bob

Alice

Sam

Accounting program

r - read, w - write, x - execute

CPSC 257 Authorization March 3, 2016 7 / 50

Page 8: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Capabilities (or C-Lists)

Store access control matrix by row.

• Capability for Alice in red.

r - read, w - write, x - execute

CPSC 257 Authorization March 3, 2016 8 / 50

Page 9: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

ACLs vs Capabilities

• Note that arrows point in opposite directions.

• ACLs: Given an object, which subjects can access it?

• Capabilities: Given a subject, what objects can it access?

CPSC 257 Authorization March 3, 2016 9 / 50

Page 10: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Confused Deputy

ACL: Two resources

• Compiler and BILL file (billing info).

• Compiler can write file BILL.

Alice can invoke compiler with a debug filename.

Alice not allowed to write to BILL.

CPSC 257 Authorization March 3, 2016 10 / 50

Page 11: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

ACL’s and Confused Deputy

Alice BILL

Compiler

debug

filename BILL BILL

• Compiler is deputy acting on behalf of Alice.

• Compiler is confused.

• Alice is not allowed to write BILL.

• Compiler has confused its rights with Alice’s.

CPSC 257 Authorization March 3, 2016 11 / 50

Page 12: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Confused Deputy

Compiler acting for Alice is confused.

There has been a separation of authority from the purpose for whichit is used.

With ACLs, more di�cult to prevent this.

With Capabilities, easier to prevent problem.

• Must maintain association between authority and intendedpurpose.

• Capabilities make it easy to delegate authority.

CPSC 257 Authorization March 3, 2016 12 / 50

Page 13: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

ACLs vs Capabilities

ACLs

• Good when users manage their own files.

• Protection is data-oriented.

• Easy to change rights to a resource.

• “Friends can become enemies”: ACLs better

Capabilities

• Easier to delegate - avoid the confused deputy.

• Easy to add/delete users.

• “Ease of use”: capabilities better.

CPSC 257 Authorization March 3, 2016 13 / 50

Page 14: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Multilevel Security (MLS) Models

CPSC 257 Authorization March 3, 2016 14 / 50

Page 15: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Classifications and Clearances

Classifications apply to objects. Clearances apply to subjects.

US Department of Defense (DoD) uses 4 levels:

• TOP SECRET

• SECRET

• CONFIDENTIAL

• UNCLASSIFIED

CPSC 257 Authorization March 3, 2016 15 / 50

Page 16: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Subjects and Objects

Let O be an object, S a subject.

• O has a classification.

• S has a clearance.

• Security level denoted L(O) and L(S).

For DoD levels, we have:TOP SECRET > SECRET > CONFIDENTIAL > UNCLASSIFIED

CPSC 257 Authorization March 3, 2016 16 / 50

Page 17: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Multilevel Security (MLS)

MLS needed when subjects/objects at di↵erent levels access the samesystem.

MLS is a form of Access Control.

Military and government interest in MLS for many decades

• Strengths and weaknesses of MLS well understood (almostentirely theoretical).

• Many possible uses of MLS outside military

CPSC 257 Authorization March 3, 2016 17 / 50

Page 18: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

MLS Applications

• Classified government/military systems.• Businesses

• Restricting information to senior management only, allmanagement, everyone in company, or general public.

• Network firewall.

• Confidential medical info, databases, etc.

MLS models explain what needs to be done but do not tell you howto implement.

• We will look at two simple models.

CPSC 257 Authorization March 3, 2016 18 / 50

Page 19: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Bell-LaPadula Model

CPSC 257 Authorization March 3, 2016 19 / 50

Page 20: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Bell-LaPadula

Bell-LaPadula (BLP) is a security model designed to express essentialrequirements for MLS.

BLP deals with confidentiality.

• To prevent unauthorized reading.

Recall that O is an object, S a subject.

• Object O has a classification.

• Subject S has a clearance.

• Security level denoted L(O) and L(S).

CPSC 257 Authorization March 3, 2016 20 / 50

Page 21: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Bell-LaPadula

BLP consists of two conditions:

• Simple Security Condition: S can read O if and only ifL(O) L(S).

• *-Property (Star Property): S can write O if and only ifL(S) L(O).

No read up, no write down.

CPSC 257 Authorization March 3, 2016 21 / 50

Page 22: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

McLean’s Criticisms of BLP

McLean: BLP is “so trivial that it is hard to imagine a realisticsecurity model for which it does not hold”.

McLean’s “system Z” allowed administrator to reclassify an object,then “write down”.

• Violates spirit of BLP, but not expressly forbidden in statementof BLP.

• Raises fundamental questions about the nature of (and limits of)modeling.

CPSC 257 Authorization March 3, 2016 22 / 50

Page 23: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

B and LP’s Response

BLP enhanced with tranquility property.

• Strong tranquility: security labels never change.

• Weak tranquility: security label can only change if it does notviolate the “established security policy”.

Strong tranquility impractical in real world.

• Often want to enforce “least privilege”.

• Give users lowest privilege for current work and then upgrade asneeded (and allowed by policy). Otherwise, need to “upgrade”classifications.

• This is known as the high water mark principle.

Weak tranquility allows for least privilege (high water mark), but theproperty is vague.

CPSC 257 Authorization March 3, 2016 23 / 50

Page 24: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

BLP: The Bottom Line

BLP is simple, probably too simple.

BLP is one of the few security models that can be used to provethings about systems.

BLP has inspired other security models.

• Most other models try to be more realistic.

• Other security models are more complex.

• Models di�cult to analyze, apply in practice.

CPSC 257 Authorization March 3, 2016 24 / 50

Page 25: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Biba’s Model

CPSC 257 Authorization March 3, 2016 25 / 50

Page 26: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Biba’s Model

BLP for confidentiality, Biba for integrity.

• Biba is to prevent unauthorized writing.

• Biba is (in a sense) the dual of BLP.

Integrity model

• Suppose you trust the integrity of O but not O.

• If object O includes O and O then you cannot trust the integrityof O.

Integrity level of O is minimum of the integrity of any object in O(the integrity of O is “degraded”).

Low water mark principle for integrity.

CPSC 257 Authorization March 3, 2016 26 / 50

Page 27: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Biba’s Model

Let I (O) denote the integrity of object O and I (S) denote theintegrity of subject S .

Biba can be stated as

• Write Access Rule: S can write O if and only if I (O) I (S)(if S writes O, the integrity of O that of S)

• Biba’s Model: S can read O if and only if I (S) I (O)(if S reads O, the integrity of S that of O)

Often, replace Biba’s Model with

• Low Water Mark Policy: If S reads O, thenI (S) = min(I (S), I (O)).

CPSC 257 Authorization March 3, 2016 27 / 50

Page 28: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

BLP vs Biba

l e v e l

high

low

L(O)

L(O) L(O)

Confidentiality

BLP

I(O)

I(O)

I(O)

Biba

l e v e l

high

low Integrity

• BLP (confidentiality): no read up, no write down.

• Biba (integrity): no read down, no write up.

CPSC 257 Authorization March 3, 2016 28 / 50

Page 29: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Compartments

CPSC 257 Authorization March 3, 2016 29 / 50

Page 30: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Compartments

Multilevel Security (MLS) enforces access control up and down.

Simple hierarchy of security labels is generally not flexible enough.

Compartments enforces restrictions across.

Eaxample:

• Suppose TOP SECRET divided into TOP SECRET{CAT} andTOP SECRET{DOG}.

• Both are TOP SECRET but information flow restricted acrossthe TOP SECRET level.

CPSC 257 Authorization March 3, 2016 30 / 50

Page 31: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Compartments

Why compartments?

• Why not create a new classification level?

May not want either of

• TOP SECRET{CAT} � TOP SECRET{DOG}.• TOP SECRET{DOG} � TOP SECRET{CAT}.

Compartments designed to enforce the need to know principle.

• Regardless of clearance, you only have access to info that youneed to know to do your job.

CPSC 257 Authorization March 3, 2016 31 / 50

Page 32: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Compartments

Arrows indicate “� relationship.

TOP SECRET {CAT, DOG}

TOP SECRET {CAT}

TOP SECRET

SECRET {CAT, DOG}

SECRET {DOG}

SECRET

TOP SECRET {DOG}

SECRET {CAT}

Not all classifications are comparable, e.g., TOP SECRET{CAT} vsSECRET{CAT, DOG}.

CPSC 257 Authorization March 3, 2016 32 / 50

Page 33: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

MLS vs Compartments

MLS can be used without compartments.

• And vice-versa

• But, MLS almost always uses compartments.

Example

• MLS mandated for protecting medical records of British MedicalAssociation (BMA).

• AIDS was TOP SECRET, prescriptions SECRET.

• What is the classification of an AIDS drug?

• Everything tends toward TOP SECRET.

• Defeats the purpose of the system!

• Compartments-only approach used instead.

CPSC 257 Authorization March 3, 2016 33 / 50

Page 34: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Covert Channel

CPSC 257 Authorization March 3, 2016 34 / 50

Page 35: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Covert Channel

MLS designed to restrict legitimate channels of communication.

May be other ways for information to flow.

For example, resources shared at di↵erent levels could be used to“signal” information.

Covert channel: a communication path not intended as such bysystem’s designers.

CPSC 257 Authorization March 3, 2016 35 / 50

Page 36: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Covert Channel Example

Alice has TOP SECRET clearance, Bob has CONFIDENTIALclearance.

Suppose the file space shared by all users.

Alice creates file FileXYzW to signal “1” to Bob, and removes file tosignal “0”.

Once per minute Bob lists the files.

• If file FileXYzW does not exist, Alice sent 0.

• If file FileXYzW exists, Alice sent 1.

Alice can leak TOP SECRET info to Bob.

CPSC 257 Authorization March 3, 2016 36 / 50

Page 37: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Covert Channel Example

Alice:

Time:

Create file Delete file Create file Delete file

Bob: Check file Check file Check file Check file Check file

Data: 1 0 1 0 1

CPSC 257 Authorization March 3, 2016 37 / 50

Page 38: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Covert Channel

Other possible covert channels?

• Print queue

• ACK messages

• Network tra�c, etc.

When does covert channel exist?

• Sender and receiver have a shared resource.

• Sender able to vary some property of resource that receiver canobserve.

• “Communication” between sender and receiver can besynchronized.

CPSC 257 Authorization March 3, 2016 38 / 50

Page 39: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Covert Channel

Potential covert channels are everywhere.

But, it’s easy to eliminate covert channels:

• “Just” eliminate all shared resources and all communication!

Virtually impossible to eliminate covert channels in any usefulinformation system.

• DoD guidelines: reduce covert channel capacity to no more than1 bit/second.

• Implication? DoD has given up on eliminating covert channels.

CPSC 257 Authorization March 3, 2016 39 / 50

Page 40: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Covert Channel

Consider 100MB TOP SECRET file.

• Plaintext stored in TOP SECRET location.

• Ciphertext - encrypted with AES using 256-bit key - stored inUNCLASSIFIED location.

Suppose we reduce covert channel capacity to 1 bit per second.

• It would take more than 25 years to leak entire documentthrough a covert channel.

• But it would take less than 5 minutes to leak 256-bit AES keythrough covert channel!

CPSC 257 Authorization March 3, 2016 40 / 50

Page 41: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Real-World Covert Channel

0 8 16 24 31

Data (variable length) Options Padding

Checksum Urgent Pointer Window

Acknowledgement Number Sequence Number

reserved Offset

Destination Port Source Port

bits

U A P R S F

Hide data in TCP header “reserved” field.

Or use covert TCP, tool to hide data in sequence number or ACKnumber.

CPSC 257 Authorization March 3, 2016 41 / 50

Page 42: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Real-World Covert Channel

A. Covert_TCP sender

C. Covert_TCP receiver

B. Innocent server

SYN Spoofed source: C Destination: B SEQ: X

ACK (or RST) Source: B Destination: C ACK: X

• TCP handshake: SYNchronize, SYNchronize-ACKnowledgement,ACKnowledgement.

• Hide data in TCP sequence numbers.

• Tool: covert TCP.

• Sequence number X contains covert info.

CPSC 257 Authorization March 3, 2016 42 / 50

Page 43: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Interference Control

CPSC 257 Authorization March 3, 2016 43 / 50

Page 44: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Inference Control Example

Suppose we query a database.

• Question: What is average salary of female CS professors at XUniversity?

• Answer: $95,000

• Question: How many female CS professors at X?

• Answer: 1

Result? Specific information has leaked from responses to generalquestions!

CPSC 257 Authorization March 3, 2016 44 / 50

Page 45: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Inference Control & Research

For example, medical records are private but valuable for research.

How to make info available for research and protect privacy?

How to allow access to such data without leaking specificinformation?

CPSC 257 Authorization March 3, 2016 45 / 50

Page 46: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Naive Inference Control

Remove names from medical records?

Still may be easy to get specific info from such “anonymous” data.

Removing names is not enough.

• As seen in previous example.

What more can be done?

CPSC 257 Authorization March 3, 2016 46 / 50

Page 47: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Less-naive Inference Control

Query set size control

• Don’t return an answer if set size is too small.

N-respondent, k% dominance rule.

• Do not release statistic if k% or more contributed by N or fewer.

• Example: Average salary in Bill Gates’ neighborhood.

• This approach used by US Census Bureau.

Randomization

• Add small amount of random noise to data.

• Many other methods - (almost) none satisfactory.

• Di↵erential privacy

CPSC 257 Authorization March 3, 2016 47 / 50

Page 48: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Netflix Example Source

Netflix prize - $1M to first to improve recommendation system by10% or more.

Netflix created dataset for contest.

• Movie preferences of real users: 10 million movie rankings by500,000 customers.

• Usernames removed, some “noise” added.

Still, insu�cient inference control.

• Researchers able to correlate IMDB reviews with those in Netflixdataset by comparing rankings and timestamps.

CPSC 257 Authorization March 3, 2016 48 / 50

Page 49: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

US Census Example Source

Researchers analyzed data from the 1990 census.

• It revealed that 87% of the U.S. population could be uniquelyidentified by just a ZIP code, date of birth, and gender.

Prescription information is routinely sold to analytics companies foruse in research and pharmaceutical marketing.

• Might include: doctor’s name and address, your diagnosis, nameand dose of your prescription, when and where picked, your ageand gender, and an encoded version of your name.

CPSC 257 Authorization March 3, 2016 49 / 50

Page 50: CPSC 257: Information Security in the Real Worldzoo.cs.yale.edu/classes/cs257/cs257.2016/ln13.pdf · Are you allowed to do that? Access control matrix has all relevant information

Something Better Than Nothing?

Robust inference control may be impossible.

Is weak inference control better than nothing?

• Yes: Reduces the amount of information that leaks.

Is weak covert channel protection better than nothing?

• Yes: Reduces the amount of information that leaks.

Is weak crypto better than no crypto?

• Probably not: Encryption indicates important data.

• May be easier to filter encrypted data.

CPSC 257 Authorization March 3, 2016 50 / 50