SlideShare a Scribd company logo
1 of 18
Chapter 15: Security
The Security Problem

              Security must consider external environment of the system, and
                   protect the system resources
              Intruders (crackers) attempt to breach security
              Threat is potential security violation
              Attack is attempt to breach security
              Attack can be accidental or malicious
              Easier to protect against accidental than malicious misuse




Operating System Concepts – 7th Edition, Jan 10, 2005   15.2        Silberschatz, Galvin and Gagne ©2005
Security Violations

              Categories
                        Breach of confidentiality
                        Breach of integrity
                        Breach of availability
                        Theft of service
                        Denial of service
              Methods
                        Masquerading (breach authentication)
                        Replay attack
                              Message modification
                        Man-in-the-middle attack
                        Session hijacking




Operating System Concepts – 7th Edition, Jan 10, 2005   15.3       Silberschatz, Galvin and Gagne ©2005
Standard Security Attacks




Operating System Concepts – 7th Edition, Jan 10, 2005   15.4   Silberschatz, Galvin and Gagne ©2005
Security Measure Levels

              Security must occur at four levels to be effective:
                        Physical
                        Human
                              Avoid social engineering, phishing, dumpster diving
                        Operating System
                        Network
              Security is as week as the weakest chain




Operating System Concepts – 7th Edition, Jan 10, 2005   15.5             Silberschatz, Galvin and Gagne ©2005
Program Threats

                  Trojan Horse
                        Code segment that misuses its environment
                        Exploits mechanisms for allowing programs written by users to be
                         executed by other users
                        Spyware, pop-up browser windows, covert channels
                  Trap Door
                        Specific user identifier or password that circumvents normal security
                         procedures
                        Could be included in a compiler
                  Logic Bomb
                        Program that initiates a security incident under certain circumstances
                  Stack and Buffer Overflow
                        Exploits a bug in a program (overflow either the stack or memory
                         buffers)




Operating System Concepts – 7th Edition, Jan 10, 2005   15.6                     Silberschatz, Galvin and Gagne ©2005
Program Threats (Cont.)

              Viruses
                        Code fragment embedded in legitimate program
                        Very specific to CPU architecture, operating system,
                         applications
                        Usually borne via email or as a macro
                              Visual Basic Macro to reformat hard drive
                                Sub AutoOpen()
                                Dim oFS
                                    Set oFS =
                                    CreateObject(’’Scripting.FileSystemObject’’)
                                    vs = Shell(’’c:command.com /k format
                                       c:’’,vbHide)
                                End Sub




Operating System Concepts – 7th Edition, Jan 10, 2005   15.7               Silberschatz, Galvin and Gagne ©2005
Program Threats (Cont.)

              Virus dropper inserts virus onto the system
              Many categories of viruses, literally many thousands of viruses
                        File
                        Boot
                        Macro
                        Source code
                        Polymorphic
                        Encrypted
                        Stealth
                        Tunneling
                        Multipartite
                        Armored




Operating System Concepts – 7th Edition, Jan 10, 2005   15.8         Silberschatz, Galvin and Gagne ©2005
A Boot-sector Computer Virus




Operating System Concepts – 7th Edition, Jan 10, 2005   15.9   Silberschatz, Galvin and Gagne ©2005
System and Network Threats

              Worms – use spawn mechanism; standalone program
              Internet worm
                        Exploited UNIX networking features (remote access) and bugs
                         in finger and sendmail programs
                        Grappling hook program uploaded main worm program
              Port scanning
                        Automated attempt to connect to a range of ports on one or a
                         range of IP addresses
              Denial of Service
                        Overload the targeted computer preventing it from doing any
                         useful work
                        Distributed denial-of-service (DDOS) come from multiple sites
                         at once




Operating System Concepts – 7th Edition, Jan 10, 2005   15.10             Silberschatz, Galvin and Gagne ©2005
Cryptography as a Security Tool

              Broadest security tool available
                        Source and destination of messages cannot be trusted without
                         cryptography
                        Means to constrain potential senders (sources) and / or
                         receivers (destinations) of messages
              Based on secrets (keys)




Operating System Concepts – 7th Edition, Jan 10, 2005   15.11             Silberschatz, Galvin and Gagne ©2005
Encryption
                  Encryption algorithm consists of
                     Set of K keys
                     Set of M Messages
                     Set of C ciphertexts (encrypted messages)
                        A function E : K → (M→C). That is, for each k K, E(k) is a function for
                         generating ciphertexts from messages.
                           Both E and E(k) for any k should be efficiently computable functions.

                        A function D : K → (C → M). That is, for each k K, D(k) is a function for
                         generating messages from ciphertexts.
                           Both D and D(k) for any k should be efficiently computable functions.

                  An encryption algorithm must provide this essential property: Given a ciphertext c C,
                   a computer can compute m such that E(k)(m) = c only if it possesses D(k).
                     Thus, a computer holding D(k) can decrypt ciphertexts to the plaintexts used to
                       produce them, but a computer not holding D(k) cannot decrypt ciphertexts.
                     Since ciphertexts are generally exposed (for example, sent on the network), it is
                       important that it be infeasible to derive D(k) from the ciphertexts




Operating System Concepts – 7th Edition, Jan 10, 2005      15.12                         Silberschatz, Galvin and Gagne ©2005
Symmetric Encryption

              Same key used to encrypt and decrypt
                        E(k) can be derived from D(k), and vice versa
              DES is most commonly used symmetric block-encryption algorithm
                   (created by US Govt)
                        Encrypts a block of data at a time
              Triple-DES considered more secure
              Advanced Encryption Standard (AES), twofish up and coming
              RC4 is most common symmetric stream cipher, but known to have
                   vulnerabilities
                        Encrypts/decrypts a stream of bytes (i.e wireless transmission)
                        Key is a input to psuedo-random-bit generator
                              Generates an infinite keystream




Operating System Concepts – 7th Edition, Jan 10, 2005   15.13              Silberschatz, Galvin and Gagne ©2005
Asymmetric Encryption

              Public-key encryption based on each user having two keys:
                        public key – published key used to encrypt data
                        private key – key known only to individual user used to decrypt
                         data
              Must be an encryption scheme that can be made public without
                   making it easy to figure out the decryption scheme
                        Most common is RSA block cipher
                        Efficient algorithm for testing whether or not a number is prime
                        No efficient algorithm is know for finding the prime factors of a
                         number




Operating System Concepts – 7th Edition, Jan 10, 2005   15.14                Silberschatz, Galvin and Gagne ©2005
Cryptography (Cont.)

              Note symmetric cryptography based on transformations,
                   asymmetric based on mathematical functions
                        Asymmetric much more compute intensive
                        Typically not used for bulk data encryption




Operating System Concepts – 7th Edition, Jan 10, 2005   15.15          Silberschatz, Galvin and Gagne ©2005
Authentication

                  Constraining set of potential senders of a message
                        Complementary and sometimes redundant to encryption
                        Also can prove message unmodified
                  Algorithm components
                        A set K of keys
                        A set M of messages
                        A set A of authenticators
                        A function S : K → (M→ A)
                              That is, for each k K, S(k) is a function for generating
                               authenticators from messages
                              Both S and S(k) for any k should be efficiently computable
                               functions
                        A function V : K → (M× A→ {true, false}). That is, for each k       K, V(k)
                         is a function for verifying authenticators on messages
                              Both V and V(k) for any k should be efficiently computable
                               functions


Operating System Concepts – 7th Edition, Jan 10, 2005    15.16                      Silberschatz, Galvin and Gagne ©2005
Digital Certificates

              Proof of who or what owns a public key
              Public key digitally signed a trusted party
              Trusted party receives proof of identification from entity and
                   certifies that public key belongs to entity
              Certificate authority are trusted party – their public keys included
                   with web browser distributions
                        They vouch for other authorities via digitally signing their keys,
                         and so on




Operating System Concepts – 7th Edition, Jan 10, 2005   15.17                Silberschatz, Galvin and Gagne ©2005
User Authentication

              Crucial to identify user correctly, as protection systems depend on
                   user ID
              User identity most often established through passwords, can be
                   considered a special case of either keys or capabilities
                        Also can include something user has and /or a user attribute
              Passwords must be kept secret
                        Frequent change of passwords
                        Use of “non-guessable” passwords
                        Log all invalid access attempts


              Passwords may also either be encrypted or allowed to be used
                   only once




Operating System Concepts – 7th Edition, Jan 10, 2005   15.18             Silberschatz, Galvin and Gagne ©2005

More Related Content

What's hot

Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
 
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...Asuka Nakajima
 
Defending The Castle Rwsp
Defending The Castle RwspDefending The Castle Rwsp
Defending The Castle Rwspjmoquendo
 
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...iotcloudserve_tein
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacksUltraUploader
 

What's hot (7)

Day1
Day1Day1
Day1
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
Day3
Day3Day3
Day3
 
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...
 
Defending The Castle Rwsp
Defending The Castle RwspDefending The Castle Rwsp
Defending The Castle Rwsp
 
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacks
 

Similar to Ch15,secu..

Shift Left Security
Shift Left SecurityShift Left Security
Shift Left SecurityBATbern
 
Operating system security Chapter 15(Security Slides)
Operating system security Chapter 15(Security Slides)Operating system security Chapter 15(Security Slides)
Operating system security Chapter 15(Security Slides)moiza354
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Op Sy 03 Ch 61
Op Sy 03 Ch 61Op Sy 03 Ch 61
Op Sy 03 Ch 61 Google
 
Chapter 09
Chapter 09Chapter 09
Chapter 09 Google
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the ThreatIBM Security
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesAmit Kumbhar
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security ProductsDaveEdwards12
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015SLBdiensten
 
10. sig free a signature free buffer overflow attack blocker
10.  sig free a signature free buffer overflow attack blocker10.  sig free a signature free buffer overflow attack blocker
10. sig free a signature free buffer overflow attack blockerakila_mano
 
Security best practices
Security best practicesSecurity best practices
Security best practicesAVEVA
 
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security OverviewShawn Wells
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Processphanleson
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009abhicc285
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedJason Chan
 
Reverse Engineering 101
Reverse Engineering 101Reverse Engineering 101
Reverse Engineering 101ysurer
 
Operating system structures
Operating system structuresOperating system structures
Operating system structuresMohd Arif
 

Similar to Ch15,secu.. (20)

Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Operating system security Chapter 15(Security Slides)
Operating system security Chapter 15(Security Slides)Operating system security Chapter 15(Security Slides)
Operating system security Chapter 15(Security Slides)
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Op Sy 03 Ch 61
Op Sy 03 Ch 61Op Sy 03 Ch 61
Op Sy 03 Ch 61
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security Products
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
10. sig free a signature free buffer overflow attack blocker
10.  sig free a signature free buffer overflow attack blocker10.  sig free a signature free buffer overflow attack blocker
10. sig free a signature free buffer overflow attack blocker
 
Security best practices
Security best practicesSecurity best practices
Security best practices
 
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
Reverse Engineering 101
Reverse Engineering 101Reverse Engineering 101
Reverse Engineering 101
 
Operating system structures
Operating system structuresOperating system structures
Operating system structures
 

Recently uploaded

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 

Recently uploaded (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Ch15,secu..

  • 2. The Security Problem  Security must consider external environment of the system, and protect the system resources  Intruders (crackers) attempt to breach security  Threat is potential security violation  Attack is attempt to breach security  Attack can be accidental or malicious  Easier to protect against accidental than malicious misuse Operating System Concepts – 7th Edition, Jan 10, 2005 15.2 Silberschatz, Galvin and Gagne ©2005
  • 3. Security Violations  Categories  Breach of confidentiality  Breach of integrity  Breach of availability  Theft of service  Denial of service  Methods  Masquerading (breach authentication)  Replay attack  Message modification  Man-in-the-middle attack  Session hijacking Operating System Concepts – 7th Edition, Jan 10, 2005 15.3 Silberschatz, Galvin and Gagne ©2005
  • 4. Standard Security Attacks Operating System Concepts – 7th Edition, Jan 10, 2005 15.4 Silberschatz, Galvin and Gagne ©2005
  • 5. Security Measure Levels  Security must occur at four levels to be effective:  Physical  Human  Avoid social engineering, phishing, dumpster diving  Operating System  Network  Security is as week as the weakest chain Operating System Concepts – 7th Edition, Jan 10, 2005 15.5 Silberschatz, Galvin and Gagne ©2005
  • 6. Program Threats  Trojan Horse  Code segment that misuses its environment  Exploits mechanisms for allowing programs written by users to be executed by other users  Spyware, pop-up browser windows, covert channels  Trap Door  Specific user identifier or password that circumvents normal security procedures  Could be included in a compiler  Logic Bomb  Program that initiates a security incident under certain circumstances  Stack and Buffer Overflow  Exploits a bug in a program (overflow either the stack or memory buffers) Operating System Concepts – 7th Edition, Jan 10, 2005 15.6 Silberschatz, Galvin and Gagne ©2005
  • 7. Program Threats (Cont.)  Viruses  Code fragment embedded in legitimate program  Very specific to CPU architecture, operating system, applications  Usually borne via email or as a macro  Visual Basic Macro to reformat hard drive Sub AutoOpen() Dim oFS Set oFS = CreateObject(’’Scripting.FileSystemObject’’) vs = Shell(’’c:command.com /k format c:’’,vbHide) End Sub Operating System Concepts – 7th Edition, Jan 10, 2005 15.7 Silberschatz, Galvin and Gagne ©2005
  • 8. Program Threats (Cont.)  Virus dropper inserts virus onto the system  Many categories of viruses, literally many thousands of viruses  File  Boot  Macro  Source code  Polymorphic  Encrypted  Stealth  Tunneling  Multipartite  Armored Operating System Concepts – 7th Edition, Jan 10, 2005 15.8 Silberschatz, Galvin and Gagne ©2005
  • 9. A Boot-sector Computer Virus Operating System Concepts – 7th Edition, Jan 10, 2005 15.9 Silberschatz, Galvin and Gagne ©2005
  • 10. System and Network Threats  Worms – use spawn mechanism; standalone program  Internet worm  Exploited UNIX networking features (remote access) and bugs in finger and sendmail programs  Grappling hook program uploaded main worm program  Port scanning  Automated attempt to connect to a range of ports on one or a range of IP addresses  Denial of Service  Overload the targeted computer preventing it from doing any useful work  Distributed denial-of-service (DDOS) come from multiple sites at once Operating System Concepts – 7th Edition, Jan 10, 2005 15.10 Silberschatz, Galvin and Gagne ©2005
  • 11. Cryptography as a Security Tool  Broadest security tool available  Source and destination of messages cannot be trusted without cryptography  Means to constrain potential senders (sources) and / or receivers (destinations) of messages  Based on secrets (keys) Operating System Concepts – 7th Edition, Jan 10, 2005 15.11 Silberschatz, Galvin and Gagne ©2005
  • 12. Encryption  Encryption algorithm consists of  Set of K keys  Set of M Messages  Set of C ciphertexts (encrypted messages)  A function E : K → (M→C). That is, for each k K, E(k) is a function for generating ciphertexts from messages.  Both E and E(k) for any k should be efficiently computable functions.  A function D : K → (C → M). That is, for each k K, D(k) is a function for generating messages from ciphertexts.  Both D and D(k) for any k should be efficiently computable functions.  An encryption algorithm must provide this essential property: Given a ciphertext c C, a computer can compute m such that E(k)(m) = c only if it possesses D(k).  Thus, a computer holding D(k) can decrypt ciphertexts to the plaintexts used to produce them, but a computer not holding D(k) cannot decrypt ciphertexts.  Since ciphertexts are generally exposed (for example, sent on the network), it is important that it be infeasible to derive D(k) from the ciphertexts Operating System Concepts – 7th Edition, Jan 10, 2005 15.12 Silberschatz, Galvin and Gagne ©2005
  • 13. Symmetric Encryption  Same key used to encrypt and decrypt  E(k) can be derived from D(k), and vice versa  DES is most commonly used symmetric block-encryption algorithm (created by US Govt)  Encrypts a block of data at a time  Triple-DES considered more secure  Advanced Encryption Standard (AES), twofish up and coming  RC4 is most common symmetric stream cipher, but known to have vulnerabilities  Encrypts/decrypts a stream of bytes (i.e wireless transmission)  Key is a input to psuedo-random-bit generator  Generates an infinite keystream Operating System Concepts – 7th Edition, Jan 10, 2005 15.13 Silberschatz, Galvin and Gagne ©2005
  • 14. Asymmetric Encryption  Public-key encryption based on each user having two keys:  public key – published key used to encrypt data  private key – key known only to individual user used to decrypt data  Must be an encryption scheme that can be made public without making it easy to figure out the decryption scheme  Most common is RSA block cipher  Efficient algorithm for testing whether or not a number is prime  No efficient algorithm is know for finding the prime factors of a number Operating System Concepts – 7th Edition, Jan 10, 2005 15.14 Silberschatz, Galvin and Gagne ©2005
  • 15. Cryptography (Cont.)  Note symmetric cryptography based on transformations, asymmetric based on mathematical functions  Asymmetric much more compute intensive  Typically not used for bulk data encryption Operating System Concepts – 7th Edition, Jan 10, 2005 15.15 Silberschatz, Galvin and Gagne ©2005
  • 16. Authentication  Constraining set of potential senders of a message  Complementary and sometimes redundant to encryption  Also can prove message unmodified  Algorithm components  A set K of keys  A set M of messages  A set A of authenticators  A function S : K → (M→ A)  That is, for each k K, S(k) is a function for generating authenticators from messages  Both S and S(k) for any k should be efficiently computable functions  A function V : K → (M× A→ {true, false}). That is, for each k K, V(k) is a function for verifying authenticators on messages  Both V and V(k) for any k should be efficiently computable functions Operating System Concepts – 7th Edition, Jan 10, 2005 15.16 Silberschatz, Galvin and Gagne ©2005
  • 17. Digital Certificates  Proof of who or what owns a public key  Public key digitally signed a trusted party  Trusted party receives proof of identification from entity and certifies that public key belongs to entity  Certificate authority are trusted party – their public keys included with web browser distributions  They vouch for other authorities via digitally signing their keys, and so on Operating System Concepts – 7th Edition, Jan 10, 2005 15.17 Silberschatz, Galvin and Gagne ©2005
  • 18. User Authentication  Crucial to identify user correctly, as protection systems depend on user ID  User identity most often established through passwords, can be considered a special case of either keys or capabilities  Also can include something user has and /or a user attribute  Passwords must be kept secret  Frequent change of passwords  Use of “non-guessable” passwords  Log all invalid access attempts  Passwords may also either be encrypted or allowed to be used only once Operating System Concepts – 7th Edition, Jan 10, 2005 15.18 Silberschatz, Galvin and Gagne ©2005