Page 209 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 209

Unit 14: Web Services and Privacy




          notion was to present a simplified set of options to the business architects — the main stakeholders  Notes
          from whom the RosettaNet team gathered data and processing requirements. These business
          architects were not versed in the technical details of the security issues, but they were able to
          contrast data that required to be passed in a secure way from data that could be sent without
          security measures.
          Though, one problem with this method was that a simplified terminology was imperative. As
          soon as the terms became complicated, the business stakeholder would request every obtainable
          type of security, just to be secure, and that effected in sub-optimal designs. It was this behavior
          on the portion of stakeholders that led the architecture group to set out easy guidelines on the
          specification of such constraints in addition to descriptions that the  client could understand.
          Doing so gave stakeholders the insight they required to make informed cost/benefit trade-off
          decisions.


                 Example: The RosettaNet team used examples to help the business user understand
          when the cost of encrypting data was far greater than the value of the data being protected.

          14.3.3 Generalization of Security Issues

          There are many texts on common software security concerns, and many more on specific security
          executions and technologies. Though, we would like to be able to address the underlying intent
          that drives security-linked technical executions. Particularly, we would like to be able to mention
          a set of descriptive primitive intents that are simple to understand, and that can be accessed to
          identify specific technical executions.

          Let us take a general instance: withdrawing cash from an ATM machine. Initially, when I walk
          up to an ATM machine, I am asked to offer two things: my ATM card (which performs as formal
          identification) and a personal identification number (PIN), which is a “shared secret” familiar to
          me and my bank, but to no one else. The ATM can now take the identification information and
          PIN and ask my bank if the person standing in front of it can be presumed, with an acceptable
          level of confidence, to be the account holder. If the issuing bank verifies the supplied details, it
          sends back to the ATM a set of security credentials that  offer additional information on the
          account holder. Depending on this account-particular information, the ATM then shows the list
          of  actions I  am authorized, as the account holder, to perform — actions that might  involve
          “withdrawal”, “deposit,” and so on.





             Notes  Note that this set of choices really represents the intersection of two sets:
             1.  The set of all operations this particular ATM is capable of performing.
             2.  The set of all operations the issuing bank verifies that I am eligible to perform.

          The credentials sent by the bank usually include a restriction on the  amount of  cash I  can
          withdraw in any single transaction-a limit that the ATM itself can enforce. The ATM system
          architect must also offer an audit trail by logging all the information flowing to and from the
          ATM.
          How is  this communication among bank and ATM  completed? How can the bank trust the
          information it obtains from the ATM and vice versa? Technical  details like these, linked to
          security protocols, data encryption and so on, are both significant and interesting — but these
          are mainly the kind of details that are outside the level of any high-level behavioral model.




                                           LOVELY PROFESSIONAL UNIVERSITY                                   203
   204   205   206   207   208   209   210   211   212   213   214