• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

Basile, C., Matteo, M.C., Mutti, S. and Paraboschi, S, “Detection of Conflicts in Security Policies”, in Vacca, J.R. (2017)

February 14, 2024 by David Lanter 15 Comments

http://community.mis.temple.edu/mis5214sp2019bnai/files/2019/01/Vacca_Chapter55_DetectionOfConflictsInSecurityPolicies.pdf

Filed Under: 06 - Firewalls Tagged With:

Reader Interactions

Comments

  1. Yannick Rugamba says

    February 18, 2024 at 1:05 pm

    Formal policy languages and ontologies allow the early identification of contradictions and redundancies in security policies by enabling automated reasoning and consistency checking.

    Log in to Reply
  2. Eyup Aslanbay says

    February 18, 2024 at 8:33 pm

    This reading highlighted various methods for identifying security issues, with a focus on the Separation of Duty conflict. SoD is key for fraud prevention and detecting malicious activities, as it restricts users from holding multiple roles in an organization. This is linked to role-based access control we studied earlier, which limits network access based on a person’s role, enhancing data security.

    Log in to Reply
    • Celinemary Turner says

      February 19, 2024 at 9:18 pm

      Very interesting post. Separation of Duty is indeed a crucial security measure aimed at preventing fraud and detecting malicious activities by ensuring that no single individual has complete control over a critical process or transaction. SoD helps reduce the risk of insider threats and unauthorized activities.

      Log in to Reply
  3. Celinemary Turner says

    February 18, 2024 at 8:37 pm

    One of the more interesting points I took away from this reading was different conflict resolution methods for firewalls. A quick summary of the different techniques included in the lessons would be :1. Deny overrides: Rules prescribing access denial take precedence.
    2. First applicable: Rules are evaluated in order
    3. Most specific wins: When one authorization dominates another, the most specific wins.
    I imagine that these deny-overrides and first-applicable may work together with the ‘most-specific wins’ if specificity is not defined for a relationship. Still, I am curious about the pros and cons of using one over the other.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      February 20, 2024 at 4:14 pm

      The firewall is a border security tool security teams use to implement security policies and configurations according to standards and requirements to provide defence and security of assets within the network system. It is very important to understand how the rules and configurations apply to achieve the purpose of protection and have the logs to draw insights from.

      Log in to Reply
    • Eyup Aslanbay says

      February 20, 2024 at 10:53 pm

      Balancing the firewall methods of deny overrides, first applicable, and most specific wins is crucial. While deny overrides ensure security, they can be restrictive. First applicable is efficient but less detailed, and most specific wins offers precision but needs detailed configuration. Their effective combination is key for optimal security and network functionality.

      Log in to Reply
  4. Edge Kroll says

    February 18, 2024 at 8:40 pm

    The separation of policy considerations from enforcement mechanisms is emphasized, showcasing various approaches to policy specification, including industry standards like XACML and Semantic Web-based proposals. A key advantage highlighted is the early detection of anomalies through formal policy representation, enabling the identification and correction of conflicts such as contradictions and redundancies. Overall, the material emphasizes the critical role of well-defined policies in ensuring effective access control and system security.

    Log in to Reply
  5. Jon Stillwagon says

    February 18, 2024 at 8:48 pm

    A list of policies and controls for companies to use/be protected for the company. The evolution of information systems is increasing rapidly along with the number of capabilities it comes with. I found interesting was the interfirewall analysis which is also apart of the defense in depth but consists of two firewalls between each computer and their distributed packet filters. There are also channel protection conflicts which are where secure channels are error prone activity. It can be confusing to see the channel protection as a firewall, but it has a smaller number of rules than a firewall.

    Log in to Reply
    • Celinemary Turner says

      February 19, 2024 at 9:56 pm

      Channel protection conflicts can be vulnerabilities in secure communication channels that may lead to error-prone activities. Therefore, ensuring the integrity and reliability of secure communication channels is essential. These channels play a critical role in securing data transmission over networks, and any conflicts or errors in their protection mechanisms can compromise the confidentiality and integrity of transmitted data.

      Log in to Reply
  6. Bo Wang says

    February 18, 2024 at 10:42 pm

    Firewalls enforce authorization policies by selecting allowed traffic based on a set of rules, typically defined in an Access Control List (ACL). When a packet arrives, its header values are evaluated against these rules. If a packet matches a rule, the action specified in the rule is enforced. ACLs prioritize rules, using a “first applicable” strategy where the action from the highest priority matching rule is taken. Hardware-based firewalls employ efficient algorithms and fast memories to speed up this process. If no rule matches, a default action, often denying traffic, is enforced.

    Log in to Reply
    • Yannick Rugamba says

      February 19, 2024 at 9:18 pm

      I appreciate your explanation of core firewall packet filtering against access control list rules, with first applicable prioritized actions. One vital addition – firewall overload dangers if traffic volume exceeds processing capacity, blocking legitimate traffic. Also underlines why capacity planning and intrusion prevention systems are key evolutions.

      Log in to Reply
      • Celinemary Turner says

        February 19, 2024 at 9:33 pm

        yes considering firewall capacity and potential overload risks is crucial, as well as intrusion prevention systems in mitigating security threats. These considerations are crucial for ensuring the effectiveness and resilience of network security.

        Log in to Reply
    • Edge Kroll says

      February 20, 2024 at 11:23 pm

      Hi Bo,
      You make some very good points. The inclusion of the default action, often denying traffic when no rule matches, is a critical aspect of firewall configurations. This default deny stance contributes to a security-first approach, ensuring that unexpected or unauthorized traffic is not inadvertently allowed.

      Log in to Reply
  7. Ooreofeoluwa Koyejo says

    February 18, 2024 at 11:31 pm

    Security policies are the requirements to align the high level business concepts with protection measures of information systems. These policies go through a process to achieve the purpose for which they were defined. Access control as an integral part of security policies can generate conflicts in contradictions and ambiguity of these policies. Segregation of duty is a principle in access control that is implemented to address conflicts in access control which defines the factors of users, roles and the permissions they carry.

    Log in to Reply
    • Bo Wang says

      February 20, 2024 at 10:30 pm

      You’re absolutely right. The first rule is to keep your strategy aligned with your goals.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in