14
Software Engineering Lecture 18 Security & Privacy

CS 5150 Software Engineering Lecture 18

  • Upload
    haile

  • View
    32

  • Download
    0

Embed Size (px)

DESCRIPTION

CS 5150 Software Engineering Lecture 18. Security & Privacy. Administrivia. Quiz 2 grading almost done Milestone 3 in less than 2 weeks. SE in the News. Modeling Dynamic Aspects of Systems. - PowerPoint PPT Presentation

Citation preview

Page 1: CS 5150 Software Engineering Lecture 18

CS 5150Software

EngineeringLecture 18

Security & Privacy

Page 2: CS 5150 Software Engineering Lecture 18

2CS 5150

Administrivia

• Quiz 2 grading almost done

• Milestone 3 in less than 2 weeks

Page 3: CS 5150 Software Engineering Lecture 18

3CS 5150

SE in the News

Page 4: CS 5150 Software Engineering Lecture 18

4CS 5150

Modeling Dynamic Aspects of Systems

• Interaction diagrams: set of objects and their relationships including messages that may be dispatched among them

• Sequence diagrams: time ordering of messages

Page 5: CS 5150 Software Engineering Lecture 18

5CS 5150

Interaction: Informal Bouncing Ball Diagrams

Page 6: CS 5150 Software Engineering Lecture 18

6CS 5150

UML Notation for Classes and Objects

Page 7: CS 5150 Software Engineering Lecture 18

7CS 5150

Notation: Active Class

• An active class is a class whose objects own one or more processes or threads and therefore can initiate control activity. When instantiated, the class controls its own execution, rather than being invoked or activated by other objects.

Page 8: CS 5150 Software Engineering Lecture 18

8CS 5150

Sequence Diagram: Painting Mechanism

Page 9: CS 5150 Software Engineering Lecture 18

9CS 5150

Core Security Technologies

• Authentication and authorization

• Firewalls

• Encryption

Page 10: CS 5150 Software Engineering Lecture 18

10

CS 5150

Authentication and Authorization

• Authentication establishes the identity of an agent:

• What does the agent know (e.g., password)?

• What does the agent possess (e.g., smart card)?

• Where does the agent have physical access to (e.g., crt-alt-del)?

• What are the physical properties of the agent (e.g., fingerprint)?

• Authorization establishes what an authenticated agent may do:

• Access control lists

• Group membership

Page 11: CS 5150 Software Engineering Lecture 18

11

CS 5150

Firewalls

Page 12: CS 5150 Software Engineering Lecture 18

12

CS 5150

Encryption

• Allows data to be stored and transmitted securely, even when the bits are viewed by unauthorized agents and the algorithms are known.

• Private key and public key

• Digital signatures

Page 13: CS 5150 Software Engineering Lecture 18

13

CS 5150

Attack Model

• Rigorous security engineering must be based on an attack model

• Who is the expected attacker?

• Why are they interested in attacking the system?

• How do you expect them to attack the system?

• What are the consequences of a successful attack?

• In safety-critical systems, attack models should be part of the earliest phases of the project

Page 14: CS 5150 Software Engineering Lecture 18

14

CS 5150

CWE Top-25

• http://cwe.mitre.org/top25/index.html