SlideShare a Scribd company logo
1 of 18
Chapter 15: Security
The Security Problem

              Security must consider external environment of the system, and
                   protect the system resources
              Intruders (crackers) attempt to breach security
              Threat is potential security violation
              Attack is attempt to breach security
              Attack can be accidental or malicious
              Easier to protect against accidental than malicious misuse




Operating System Concepts – 7th Edition, Jan 10, 2005   15.2        Silberschatz, Galvin and Gagne ©2005
Security Violations

              Categories
                        Breach of confidentiality
                        Breach of integrity
                        Breach of availability
                        Theft of service
                        Denial of service
              Methods
                        Masquerading (breach authentication)
                        Replay attack
                              Message modification
                        Man-in-the-middle attack
                        Session hijacking




Operating System Concepts – 7th Edition, Jan 10, 2005   15.3       Silberschatz, Galvin and Gagne ©2005
Standard Security Attacks




Operating System Concepts – 7th Edition, Jan 10, 2005   15.4   Silberschatz, Galvin and Gagne ©2005
Security Measure Levels

              Security must occur at four levels to be effective:
                        Physical
                        Human
                              Avoid social engineering, phishing, dumpster diving
                        Operating System
                        Network
              Security is as week as the weakest chain




Operating System Concepts – 7th Edition, Jan 10, 2005   15.5             Silberschatz, Galvin and Gagne ©2005
Program Threats

                  Trojan Horse
                        Code segment that misuses its environment
                        Exploits mechanisms for allowing programs written by users to be
                         executed by other users
                        Spyware, pop-up browser windows, covert channels
                  Trap Door
                        Specific user identifier or password that circumvents normal security
                         procedures
                        Could be included in a compiler
                  Logic Bomb
                        Program that initiates a security incident under certain circumstances
                  Stack and Buffer Overflow
                        Exploits a bug in a program (overflow either the stack or memory
                         buffers)




Operating System Concepts – 7th Edition, Jan 10, 2005   15.6                     Silberschatz, Galvin and Gagne ©2005
Program Threats (Cont.)

              Viruses
                        Code fragment embedded in legitimate program
                        Very specific to CPU architecture, operating system,
                         applications
                        Usually borne via email or as a macro
                              Visual Basic Macro to reformat hard drive
                                Sub AutoOpen()
                                Dim oFS
                                    Set oFS =
                                    CreateObject(’’Scripting.FileSystemObject’’)
                                    vs = Shell(’’c:command.com /k format
                                       c:’’,vbHide)
                                End Sub




Operating System Concepts – 7th Edition, Jan 10, 2005   15.7               Silberschatz, Galvin and Gagne ©2005
Program Threats (Cont.)

              Virus dropper inserts virus onto the system
              Many categories of viruses, literally many thousands of viruses
                        File
                        Boot
                        Macro
                        Source code
                        Polymorphic
                        Encrypted
                        Stealth
                        Tunneling
                        Multipartite
                        Armored




Operating System Concepts – 7th Edition, Jan 10, 2005   15.8         Silberschatz, Galvin and Gagne ©2005
A Boot-sector Computer Virus




Operating System Concepts – 7th Edition, Jan 10, 2005   15.9   Silberschatz, Galvin and Gagne ©2005
System and Network Threats

              Worms – use spawn mechanism; standalone program
              Internet worm
                        Exploited UNIX networking features (remote access) and bugs
                         in finger and sendmail programs
                        Grappling hook program uploaded main worm program
              Port scanning
                        Automated attempt to connect to a range of ports on one or a
                         range of IP addresses
              Denial of Service
                        Overload the targeted computer preventing it from doing any
                         useful work
                        Distributed denial-of-service (DDOS) come from multiple sites
                         at once




Operating System Concepts – 7th Edition, Jan 10, 2005   15.10             Silberschatz, Galvin and Gagne ©2005
Cryptography as a Security Tool

              Broadest security tool available
                        Source and destination of messages cannot be trusted without
                         cryptography
                        Means to constrain potential senders (sources) and / or
                         receivers (destinations) of messages
              Based on secrets (keys)




Operating System Concepts – 7th Edition, Jan 10, 2005   15.11             Silberschatz, Galvin and Gagne ©2005
Encryption
                  Encryption algorithm consists of
                     Set of K keys
                     Set of M Messages
                     Set of C ciphertexts (encrypted messages)
                        A function E : K → (M→C). That is, for each k K, E(k) is a function for
                         generating ciphertexts from messages.
                           Both E and E(k) for any k should be efficiently computable functions.

                        A function D : K → (C → M). That is, for each k K, D(k) is a function for
                         generating messages from ciphertexts.
                           Both D and D(k) for any k should be efficiently computable functions.

                  An encryption algorithm must provide this essential property: Given a ciphertext c C,
                   a computer can compute m such that E(k)(m) = c only if it possesses D(k).
                     Thus, a computer holding D(k) can decrypt ciphertexts to the plaintexts used to
                       produce them, but a computer not holding D(k) cannot decrypt ciphertexts.
                     Since ciphertexts are generally exposed (for example, sent on the network), it is
                       important that it be infeasible to derive D(k) from the ciphertexts




Operating System Concepts – 7th Edition, Jan 10, 2005      15.12                         Silberschatz, Galvin and Gagne ©2005
Symmetric Encryption

              Same key used to encrypt and decrypt
                        E(k) can be derived from D(k), and vice versa
              DES is most commonly used symmetric block-encryption algorithm
                   (created by US Govt)
                        Encrypts a block of data at a time
              Triple-DES considered more secure
              Advanced Encryption Standard (AES), twofish up and coming
              RC4 is most common symmetric stream cipher, but known to have
                   vulnerabilities
                        Encrypts/decrypts a stream of bytes (i.e wireless transmission)
                        Key is a input to psuedo-random-bit generator
                              Generates an infinite keystream




Operating System Concepts – 7th Edition, Jan 10, 2005   15.13              Silberschatz, Galvin and Gagne ©2005
Asymmetric Encryption

              Public-key encryption based on each user having two keys:
                        public key – published key used to encrypt data
                        private key – key known only to individual user used to decrypt
                         data
              Must be an encryption scheme that can be made public without
                   making it easy to figure out the decryption scheme
                        Most common is RSA block cipher
                        Efficient algorithm for testing whether or not a number is prime
                        No efficient algorithm is know for finding the prime factors of a
                         number




Operating System Concepts – 7th Edition, Jan 10, 2005   15.14                Silberschatz, Galvin and Gagne ©2005
Cryptography (Cont.)

              Note symmetric cryptography based on transformations,
                   asymmetric based on mathematical functions
                        Asymmetric much more compute intensive
                        Typically not used for bulk data encryption




Operating System Concepts – 7th Edition, Jan 10, 2005   15.15          Silberschatz, Galvin and Gagne ©2005
Authentication

                  Constraining set of potential senders of a message
                        Complementary and sometimes redundant to encryption
                        Also can prove message unmodified
                  Algorithm components
                        A set K of keys
                        A set M of messages
                        A set A of authenticators
                        A function S : K → (M→ A)
                              That is, for each k K, S(k) is a function for generating
                               authenticators from messages
                              Both S and S(k) for any k should be efficiently computable
                               functions
                        A function V : K → (M× A→ {true, false}). That is, for each k       K, V(k)
                         is a function for verifying authenticators on messages
                              Both V and V(k) for any k should be efficiently computable
                               functions


Operating System Concepts – 7th Edition, Jan 10, 2005    15.16                      Silberschatz, Galvin and Gagne ©2005
Digital Certificates

              Proof of who or what owns a public key
              Public key digitally signed a trusted party
              Trusted party receives proof of identification from entity and
                   certifies that public key belongs to entity
              Certificate authority are trusted party – their public keys included
                   with web browser distributions
                        They vouch for other authorities via digitally signing their keys,
                         and so on




Operating System Concepts – 7th Edition, Jan 10, 2005   15.17                Silberschatz, Galvin and Gagne ©2005
User Authentication

              Crucial to identify user correctly, as protection systems depend on
                   user ID
              User identity most often established through passwords, can be
                   considered a special case of either keys or capabilities
                        Also can include something user has and /or a user attribute
              Passwords must be kept secret
                        Frequent change of passwords
                        Use of “non-guessable” passwords
                        Log all invalid access attempts


              Passwords may also either be encrypted or allowed to be used
                   only once




Operating System Concepts – 7th Edition, Jan 10, 2005   15.18             Silberschatz, Galvin and Gagne ©2005

More Related Content

What's hot

Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
 
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...Asuka Nakajima
 
Defending The Castle Rwsp
Defending The Castle RwspDefending The Castle Rwsp
Defending The Castle Rwspjmoquendo
 
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...iotcloudserve_tein
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacksUltraUploader
 

What's hot (7)

Day1
Day1Day1
Day1
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
Day3
Day3Day3
Day3
 
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...
[AsiaCCS2019] A Pilot Study on Consumer IoT Device Vulnerability Disclosure a...
 
Defending The Castle Rwsp
Defending The Castle RwspDefending The Castle Rwsp
Defending The Castle Rwsp
 
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
Introduction to DevOps and DevOpsSec with Secure Design by Prof.Krerk (Chulal...
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacks
 

Similar to Ch15,secu..

Shift Left Security
Shift Left SecurityShift Left Security
Shift Left SecurityBATbern
 
Operating system security Chapter 15(Security Slides)
Operating system security Chapter 15(Security Slides)Operating system security Chapter 15(Security Slides)
Operating system security Chapter 15(Security Slides)moiza354
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Op Sy 03 Ch 61
Op Sy 03 Ch 61Op Sy 03 Ch 61
Op Sy 03 Ch 61 Google
 
Chapter 09
Chapter 09Chapter 09
Chapter 09 Google
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the ThreatIBM Security
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesAmit Kumbhar
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security ProductsDaveEdwards12
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015SLBdiensten
 
10. sig free a signature free buffer overflow attack blocker
10.  sig free a signature free buffer overflow attack blocker10.  sig free a signature free buffer overflow attack blocker
10. sig free a signature free buffer overflow attack blockerakila_mano
 
Security best practices
Security best practicesSecurity best practices
Security best practicesAVEVA
 
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security OverviewShawn Wells
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Processphanleson
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009abhicc285
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedJason Chan
 
Reverse Engineering 101
Reverse Engineering 101Reverse Engineering 101
Reverse Engineering 101ysurer
 
Operating system structures
Operating system structuresOperating system structures
Operating system structuresMohd Arif
 

Similar to Ch15,secu.. (20)

Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Operating system security Chapter 15(Security Slides)
Operating system security Chapter 15(Security Slides)Operating system security Chapter 15(Security Slides)
Operating system security Chapter 15(Security Slides)
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Op Sy 03 Ch 61
Op Sy 03 Ch 61Op Sy 03 Ch 61
Op Sy 03 Ch 61
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Vulnerability in Security Products
Vulnerability in Security ProductsVulnerability in Security Products
Vulnerability in Security Products
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
10. sig free a signature free buffer overflow attack blocker
10.  sig free a signature free buffer overflow attack blocker10.  sig free a signature free buffer overflow attack blocker
10. sig free a signature free buffer overflow attack blocker
 
Security best practices
Security best practicesSecurity best practices
Security best practices
 
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
Reverse Engineering 101
Reverse Engineering 101Reverse Engineering 101
Reverse Engineering 101
 
Operating system structures
Operating system structuresOperating system structures
Operating system structures
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Ch15,secu..

  • 2. The Security Problem  Security must consider external environment of the system, and protect the system resources  Intruders (crackers) attempt to breach security  Threat is potential security violation  Attack is attempt to breach security  Attack can be accidental or malicious  Easier to protect against accidental than malicious misuse Operating System Concepts – 7th Edition, Jan 10, 2005 15.2 Silberschatz, Galvin and Gagne ©2005
  • 3. Security Violations  Categories  Breach of confidentiality  Breach of integrity  Breach of availability  Theft of service  Denial of service  Methods  Masquerading (breach authentication)  Replay attack  Message modification  Man-in-the-middle attack  Session hijacking Operating System Concepts – 7th Edition, Jan 10, 2005 15.3 Silberschatz, Galvin and Gagne ©2005
  • 4. Standard Security Attacks Operating System Concepts – 7th Edition, Jan 10, 2005 15.4 Silberschatz, Galvin and Gagne ©2005
  • 5. Security Measure Levels  Security must occur at four levels to be effective:  Physical  Human  Avoid social engineering, phishing, dumpster diving  Operating System  Network  Security is as week as the weakest chain Operating System Concepts – 7th Edition, Jan 10, 2005 15.5 Silberschatz, Galvin and Gagne ©2005
  • 6. Program Threats  Trojan Horse  Code segment that misuses its environment  Exploits mechanisms for allowing programs written by users to be executed by other users  Spyware, pop-up browser windows, covert channels  Trap Door  Specific user identifier or password that circumvents normal security procedures  Could be included in a compiler  Logic Bomb  Program that initiates a security incident under certain circumstances  Stack and Buffer Overflow  Exploits a bug in a program (overflow either the stack or memory buffers) Operating System Concepts – 7th Edition, Jan 10, 2005 15.6 Silberschatz, Galvin and Gagne ©2005
  • 7. Program Threats (Cont.)  Viruses  Code fragment embedded in legitimate program  Very specific to CPU architecture, operating system, applications  Usually borne via email or as a macro  Visual Basic Macro to reformat hard drive Sub AutoOpen() Dim oFS Set oFS = CreateObject(’’Scripting.FileSystemObject’’) vs = Shell(’’c:command.com /k format c:’’,vbHide) End Sub Operating System Concepts – 7th Edition, Jan 10, 2005 15.7 Silberschatz, Galvin and Gagne ©2005
  • 8. Program Threats (Cont.)  Virus dropper inserts virus onto the system  Many categories of viruses, literally many thousands of viruses  File  Boot  Macro  Source code  Polymorphic  Encrypted  Stealth  Tunneling  Multipartite  Armored Operating System Concepts – 7th Edition, Jan 10, 2005 15.8 Silberschatz, Galvin and Gagne ©2005
  • 9. A Boot-sector Computer Virus Operating System Concepts – 7th Edition, Jan 10, 2005 15.9 Silberschatz, Galvin and Gagne ©2005
  • 10. System and Network Threats  Worms – use spawn mechanism; standalone program  Internet worm  Exploited UNIX networking features (remote access) and bugs in finger and sendmail programs  Grappling hook program uploaded main worm program  Port scanning  Automated attempt to connect to a range of ports on one or a range of IP addresses  Denial of Service  Overload the targeted computer preventing it from doing any useful work  Distributed denial-of-service (DDOS) come from multiple sites at once Operating System Concepts – 7th Edition, Jan 10, 2005 15.10 Silberschatz, Galvin and Gagne ©2005
  • 11. Cryptography as a Security Tool  Broadest security tool available  Source and destination of messages cannot be trusted without cryptography  Means to constrain potential senders (sources) and / or receivers (destinations) of messages  Based on secrets (keys) Operating System Concepts – 7th Edition, Jan 10, 2005 15.11 Silberschatz, Galvin and Gagne ©2005
  • 12. Encryption  Encryption algorithm consists of  Set of K keys  Set of M Messages  Set of C ciphertexts (encrypted messages)  A function E : K → (M→C). That is, for each k K, E(k) is a function for generating ciphertexts from messages.  Both E and E(k) for any k should be efficiently computable functions.  A function D : K → (C → M). That is, for each k K, D(k) is a function for generating messages from ciphertexts.  Both D and D(k) for any k should be efficiently computable functions.  An encryption algorithm must provide this essential property: Given a ciphertext c C, a computer can compute m such that E(k)(m) = c only if it possesses D(k).  Thus, a computer holding D(k) can decrypt ciphertexts to the plaintexts used to produce them, but a computer not holding D(k) cannot decrypt ciphertexts.  Since ciphertexts are generally exposed (for example, sent on the network), it is important that it be infeasible to derive D(k) from the ciphertexts Operating System Concepts – 7th Edition, Jan 10, 2005 15.12 Silberschatz, Galvin and Gagne ©2005
  • 13. Symmetric Encryption  Same key used to encrypt and decrypt  E(k) can be derived from D(k), and vice versa  DES is most commonly used symmetric block-encryption algorithm (created by US Govt)  Encrypts a block of data at a time  Triple-DES considered more secure  Advanced Encryption Standard (AES), twofish up and coming  RC4 is most common symmetric stream cipher, but known to have vulnerabilities  Encrypts/decrypts a stream of bytes (i.e wireless transmission)  Key is a input to psuedo-random-bit generator  Generates an infinite keystream Operating System Concepts – 7th Edition, Jan 10, 2005 15.13 Silberschatz, Galvin and Gagne ©2005
  • 14. Asymmetric Encryption  Public-key encryption based on each user having two keys:  public key – published key used to encrypt data  private key – key known only to individual user used to decrypt data  Must be an encryption scheme that can be made public without making it easy to figure out the decryption scheme  Most common is RSA block cipher  Efficient algorithm for testing whether or not a number is prime  No efficient algorithm is know for finding the prime factors of a number Operating System Concepts – 7th Edition, Jan 10, 2005 15.14 Silberschatz, Galvin and Gagne ©2005
  • 15. Cryptography (Cont.)  Note symmetric cryptography based on transformations, asymmetric based on mathematical functions  Asymmetric much more compute intensive  Typically not used for bulk data encryption Operating System Concepts – 7th Edition, Jan 10, 2005 15.15 Silberschatz, Galvin and Gagne ©2005
  • 16. Authentication  Constraining set of potential senders of a message  Complementary and sometimes redundant to encryption  Also can prove message unmodified  Algorithm components  A set K of keys  A set M of messages  A set A of authenticators  A function S : K → (M→ A)  That is, for each k K, S(k) is a function for generating authenticators from messages  Both S and S(k) for any k should be efficiently computable functions  A function V : K → (M× A→ {true, false}). That is, for each k K, V(k) is a function for verifying authenticators on messages  Both V and V(k) for any k should be efficiently computable functions Operating System Concepts – 7th Edition, Jan 10, 2005 15.16 Silberschatz, Galvin and Gagne ©2005
  • 17. Digital Certificates  Proof of who or what owns a public key  Public key digitally signed a trusted party  Trusted party receives proof of identification from entity and certifies that public key belongs to entity  Certificate authority are trusted party – their public keys included with web browser distributions  They vouch for other authorities via digitally signing their keys, and so on Operating System Concepts – 7th Edition, Jan 10, 2005 15.17 Silberschatz, Galvin and Gagne ©2005
  • 18. User Authentication  Crucial to identify user correctly, as protection systems depend on user ID  User identity most often established through passwords, can be considered a special case of either keys or capabilities  Also can include something user has and /or a user attribute  Passwords must be kept secret  Frequent change of passwords  Use of “non-guessable” passwords  Log all invalid access attempts  Passwords may also either be encrypted or allowed to be used only once Operating System Concepts – 7th Edition, Jan 10, 2005 15.18 Silberschatz, Galvin and Gagne ©2005