Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14a: Security I.

Slides:



Advertisements
Similar presentations
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Chapter 15 Security Bernard Chen Spring Protection vs. Security Protection (Ch.14) deals with internal problem Security (Ch. 15) Deals with external.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Security  The Security Problem  Authentication  Program Threats  System Threats  Securing Systems  Intrusion (unwanted involvement) Detection  Encryption.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
Module 6.0: Security and Protection
Chapter 15: Security. The Security Problem Security must consider external environment of the system, and protect the system resources Intruders (crackers)
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
What we will cover… Protection and Security in OS.
Lecture 21 Chapter 14: Protection Chapter 15: Security
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 15: System Security.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Security.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 15: Security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CS 149: Operating Systems April 30 Class Meeting Department of Computer Science San Jose State University Spring 2015 Instructor: Ron Mak
Operating Systems Protection & Security.
15.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 The Security Problem Security must consider external environment.
13.1 Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Security.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since.
Operating system Security By Murtaza K. Madraswala.
System Security. The Security Problem Security must consider external environment of the system, and protect the system resources Intruders (crackers)
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Systems II San Pham CS /20/03. Topics Operating Systems Resource Management – Process Management – CPU Scheduling – Deadlock Protection/Security.
Chapter 15: Security Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Chapter 15: Security The Security.
Topic 5: Basic Security.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 15: Security.
Malicious Software.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Chapter 14: Security.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition Chapter 15: Security.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
CSE Operating System Principles Security. CSE – Operating System Principles2 Security The Security Problem Program Threats System and Network.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
OPERATING SYSTEMS COURSE THE HEBREW UNIVERSITY SPRING Security.
Types of security violation –
Chapter 15: Security.
Operating System Security & Smartphones
Chapter 15: Security Source & Copyright: Operating System Concepts, Silberschatz, Galvin and Gagne.
Security Shmuel Wimer prepared and instructed by
Operating system Security
Chapter 15: Security Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 6: Protection & Security
Chapter 15: Security.
12: Security The Security Problem Authentication Program Threats
Chap 10 Malicious Software.
Security.
Chap 10 Malicious Software.
Operating System Concepts
Operating System Concepts
Chapter 14: Protection.
Presentation transcript:

Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14a: Security I

14.2 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14: Security The Security Problem Program Threats System and Network Threats

14.3 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Objectives Discuss security threats and attacks Explain fundamentals of encryption, authentication, and hashing Examine uses of cryptography in computing Describe various countermeasures to security attacks

14.4 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition The Security Problem Secure : resources used and accessed as intended under all circumstances Unachievable Intruders (crackers) attempt to breach security Threat is potential security violation Attack is attempt to breach security Attack can be accidental or malicious Easier to protect against accidental than malicious

14.5 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Security Violation Categories Breach of confidentiality Unauthorized reading of data Breach of integrity Unauthorized modification of data Breach of availability Unauthorized destruction of data

14.6 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Security Violation Categories Theft of service Unauthorized use of resources Denial of service (DOS) Prevention of legitimate use

14.7 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Security Violation Methods Masquerading (breach authentication) Pretending to be authorized user to escalate privileges Replay attack Valid network communication repeated e.g., bank transaction

14.8 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Security Violation Methods Man-in-the-middle attack Intruder sits in data flow, masquerading as sender to receiver and vice versa Session hijacking Intercept an already-established session to bypass authentication

14.9 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Standard Security Attacks

14.10 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Standard Security Attacks

14.11 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Security Measure Levels Impossible to have absolute security, make cost to perpetrator sufficiently high to deter most intruders Security is as weak as the weakest link in the chain But can too much security be a problem?

14.12 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Security Measure Levels Security must occur at four levels: Physical  Data centers, servers, connected terminals Human  Avoid social engineering, phishing, dumpster diving Operating System  Protection mechanisms, debugging Network  Intercepted communications, interruption, DOS

14.13 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14: Security The Security Problem Program Threats System and Network Threats

14.14 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Program Threats Many variations, many names Trojan Horse Code segment that misuses its environment Exploits mechanisms that allow programs written by users to be executed by other users  E.g., Spyware, pop-up browser windows ~80% of spam delivered by spyware-infected systems

14.15 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Program Threats Trap Door Specific user identifier or password that circumvents normal security procedures Could be included in compiler Logic Bomb Program initiates security incident under certain circumstances

14.16 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Program Threats (Cont.) Stack and Buffer Overflow Exploits a bug in program  E.g., overflow stack or memory buffers Failure to check bounds on inputs, arguments Write past arguments on stack... into the return address on stack Routine returns from call, returns to hacked address  Points to malicious code loaded onto stack

14.17 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Layout of Typical Stack Frame

14.18 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Modified Shell Code #include int main(int argc, char *argv[]) { execvp(‘‘\bin\sh’’,‘‘\bin \sh’’, NULL); return 0; }

14.19 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Hypothetical Stack Frame Before attack After attack

14.20 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Great Programming Required? Buffer overflow can be disabled by Disabling stack execution Adding bit to page table to indicate “non-executable” Available in SPARC and x86 Still have security exploits

14.21 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Program Threats (Cont.) Viruses Code fragment embedded in legitimate program Self-replicating, infects other computers Specific to CPU architecture, OS, applications Usually borne via or as macro  E.g., Visual Basic Macro to reformat hard drive Sub AutoOpen() Dim oFS Set oFS = CreateObject(’’Scripting.FileSystemObject’’) vs = Shell(’’c:command.com /k format c:’’,vbHide) End Sub

14.22 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Program Threats (Cont.) Virus dropper inserts virus onto system Many categories of viruses: File / parasitic Boot / memory Macro Source code Polymorphic to avoid having a virus signature Encrypted Stealth Tunneling Multipartite Armored

14.23 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Program Threats (Cont.) File / parasitic Appends itself to end of program file (parasite) After execution, returns control to original program  Difficult to detect! Boot / memory Infects boot sector on disk Runs on boot (before OS loaded) Macro Written in high-level language E.g., Visual Basic Macro in MS Word, Excel

14.24 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Program Threats (Cont.) Source code Looks for source code files on system Modifies source code to execute virus Polymorphic Changes virus signature each time it’s installed Difficult to detect Encrypted Decrypted before executed Difficult to detect

14.25 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Program Threats (Cont.) Stealth Modify parts of system used to detect it E.g., modify system calls Tunneling Virus installs itself in interrupt-handler chain Also device drivers Bypasses detection

14.26 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Program Threats (Cont.) Multipartite Infects multiple parts of the system Armored Difficult to unravel / understand

14.27 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition The Threat Continues Attacks still common, still occurring Moved from science experiments to cyber-terrorism Target specific companies, governments Botnets as tool for spam and DDOS delivery Keystroke logger grab passwords, credit card numbers

14.28 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14: Security The Security Problem Program Threats System and Network Threats

14.29 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition System and Network Threats Some systems “open” rather than secure by default Reduce attack surface Harder to use, more knowledge needed to administer

14.30 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition System and Network Threats Network threats harder to detect, prevent Protection systems weaker More difficult to have shared secret to base access No physical limits once system attached to Internet  Or on network with system attached to Internet Determining location of connecting system difficult  IP address is only knowledge

14.31 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition System and Network Threats (Cont.) Worms – use spawn mechanism; standalone program Internet worm Exploited UNIX networking features (remote access) and bugs in finger and sendmail programs Exploited trust-relationship mechanism used by rsh to access friendly systems without use of password

14.32 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition System and Network Threats (Cont.) Internet worm (cont.) Grappling hook program uploaded main worm  99 lines of C Hooked system then uploaded main code  Tried to attack connected systems  Tried to break into other users accounts on local system via password guessing

14.33 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition The Morris Internet Worm

14.34 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition System and Network Threats (Cont.) Port scanning Automated attempt to connect to range of ports  On one or range of IP addresses Detect OS and version running on system Detect answering service protocol  Attacks known services + vulnerabilities Frequently launched from zombie systems  Decreases traceability nmap program scans all ports in given IP range

14.35 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition System and Network Threats (Cont.) Denial of Service Overload targeted computer  Prevent it from doing any useful work Distributed denial-of-service (DDOS) come from multiple sites at once Consider web site traffic  Popular vs. target? Accidental – CS students writing bad fork() code Purposeful – extortion, punishment

14.36 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Sobig.F Worm Disguised as photo uploaded to adult newsgroup Via account created with stolen credit card Targeted Windows systems Had own SMTP engine to mail itself as attachment to everyone in infected system’s address book Disguised with innocuous subject lines, looking like it came from someone known Attachment was executable program that created WINPPR23.EXE in default Windows system directory Also modified Windows registry

Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition End of Chapter 14a