Security Models: Part 2 - State Machine Model

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
15 hours 43 minutes
Difficulty
Advanced
CEU/CPE
16
Video Transcription
00:00
>> Our first of the Security Models,
00:00
I don't know that you would specifically see
00:00
the state machine model on the test
00:00
>> which is interesting for me
00:00
>> because this has to be the basis
00:00
>> for every other model we're going to look at.
00:00
>> Hey, it's called the state machine model,
00:00
and this should make sense
00:00
why it has to be the basis for all other systems.
00:00
Now at first, this sounds ridiculously easy
00:00
>> because what I'm going to tell you is,
00:00
>> if a system starts securely,
00:00
if a system functions securely,
00:00
and if it shuts down securely,
00:00
then what do you know about that system?
00:00
It's a secure system.
00:00
That sounds very basic,
00:00
but what's so important about this is
00:00
>> if any one of those requirements is not true,
00:00
>> then your system is not secure.
00:00
For instance, it doesn't matter;
00:00
>> how secure your function,
00:00
>> how secure your shutdown,
00:00
if I can force an error while your system starts up.
00:00
As a matter of fact,
00:00
startup is where your system is the most vulnerable
00:00
because most of your defensive mechanisms
00:00
haven't been loaded yet.
00:00
I'll tell you this is one of the reasons that
00:00
rootkits are able to get into a system undetected
00:00
>> because many rootkits
00:00
>> load themselves at the beginning of
00:00
the operating system load before
00:00
their security elements are loaded
00:00
and it sneaks in there undetected.
00:00
The operating system kernel,
00:00
very early loads in a rootkit gets in there
00:00
>> and we'll talk about the operating system kernel.
00:00
>> But basically, it's the heart and soul of the OS.
00:00
A lot of rootkits are,
00:00
or you may see an attack where rootkit is saved with
00:00
the extension of VXD
00:00
and a VXD is a virtual device driver,
00:00
but what's significant is it loads very early on.
00:00
Again, rootkits often compromise the system at startup.
00:00
Now, once your system is compromise,
00:00
there's no turning back.
00:00
You can have all the security software
00:00
in the world for function,
00:00
and it can be protected,
00:00
shut down, but still not secure.
00:00
Now, if a system's running and gets compromised,
00:00
we've seen instances of malware
00:00
>> and covert channels and all these different things,
00:00
>> then it's not secure,
00:00
and then also in shutdown,
00:00
if a system is compromised,
00:00
in shutdown, it's not secure.
00:00
Now, the idea is,
00:00
if I can force the system to fail in such a way
00:00
>> that resources or sessions
00:00
>> or elements are hanging or left open,
00:00
>> then that's a point for compromise.
00:00
A matter of fact, if you've ever seen
00:00
the blue screen of death with a Windows system,
00:00
if you think about that blue screen,
00:00
what can you do
00:00
>> when your system blue screens or locks up?
00:00
>> You can't run applications,
00:00
you can't export, it can't import.
00:00
You can't really do much of anything
00:00
>> and that's a secure shut down.
00:00
>> That shut down, see, it's an undocumented feature.
00:00
It's not a problem, it's a feature.
00:00
But that shut down, terminates all processes,
00:00
so nothing's left hanging
00:00
that an attacker can compromise.
00:00
These are just some ways that our systems
00:00
follow the state machine model,
00:00
which could also be called the secure state model.
00:00
But at any rate,
00:00
some systems do so better than others,
00:00
but all system shouldn't attempt security at start,
00:00
function and shut down,
00:00
and the degree to which they're successful
00:00
>> will determine the security of the system.
00:00
>> That just wraps up a little discussion
00:00
on the state machine model.
00:00
The reason I said this is the basic foundation
00:00
>> for all the other models.
00:00
>> We can add on security,
00:00
but the rest of the security models are going to focus
00:00
>> on the system while it's running, while its operating.
00:00
>> The state machine model comes in and reminds us,
00:00
>> hey, you got a security at the beginning,
00:00
>> as well as function,
00:00
as well as shut down,
00:00
you can't just focus
00:00
while the operating system is running,
00:00
so the state machine model, very important model.
00:00
It's at the base of all the other security models.
Up Next