SECURITY Prepared By: Dr. Vipul Vekariya.. 2 S ECURITY Secure system will control, through use of specific futures, access to information that only properly.

Slides:



Advertisements
Similar presentations
RBAC and HIPAA Security Uday O. Ali Pabrai, CHSS, SCNA Chief Executive, HIPAA Academy.
Advertisements

Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Chapter 15 Computer Security Techniques
Operating System Security
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Lecture 6 User Authentication (cont)
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 3 “User Authentication”.
Access Control Methodologies
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
2  A system can protect itself in two ways: It can limit who can access the system. This requires the system to implement a two-step process of identification.
Lecture 7 Access Control
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Marjie Rodrigues
Security-Authentication
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Li Xiong CS573 Data Privacy and Security Access Control.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Chapter 10: Authentication Guide to Computer Network Security.
Tonight 1) Where we are 2) Article Presentation(s) 3) Quiz 4) Lecture 5) In-class lab(s)
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
BUSINESS B1 Information Security.
Operating system Security By Murtaza K. Madraswala.
Li Xiong CS573 Data Privacy and Security Access Control.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Access Control / Authenticity Michael Sheppard 11/10/10.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
An Introduction to Biometrics
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Identity and Access Management
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter One: Mastering the Basics of Security
Challenge/Response Authentication
Computer Data Security & Privacy
Authentication.
SECURITY in IT ~Shikhar Agarwal.
Operating system Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Resource Management Chapter 19 9/20/2018 Crowley OS Chap. 19.
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Laws for Secure Credentialing
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Authentication Chapter 2.
PLANNING A SECURE BASELINE INSTALLATION
Operating System Concepts
Computer Security Protection in general purpose Operating Systems
Mohammad Alauthman Computer Security Mohammad Alauthman
Chapter Goals Discuss the CIA triad
COEN 351 Authentication.
Operating Systems Concepts
AUTHORIZATION AND ACCESS CONTROL DATA SECURITY identification Authentication Authorization.
Presentation transcript:

SECURITY Prepared By: Dr. Vipul Vekariya.

2 S ECURITY Secure system will control, through use of specific futures, access to information that only properly authorized individuals or processes operating on their behalf will have access to read, write, create or delete.

C OMPUTER S ECURITY T RIAD Three key objectives are at the heart of computer security Confidentiality Integrity Availability

S ECURITY THREATS The major threats to security in any computing environment. 1) Unauthorized use of service(tapping) 2) Unauthorized disclosure of information(disclosure) 3) Unauthorized alteration or deletion of information (amendment) 4) Unauthorized fabrication of information(Fabrication) 5) Denial of service to authorized user(Denial) 4

A TTACKS ON S ECURITY Authentication Trap doors Line tapping Improper access control Trojan horse Ordinary software bomb Timed software bomb Logical software bomb Worm virus 5

P RINCIPLE OF S ECURITY D ESIGN Public design: the design of security system should not be secret. Assume that penetrator will know about it. Least privilege: every process should be given the least privileges that are necessary for execution. Explicit demand: No access right should be granted to a process as a default. Each subject should have demand the access rights explicitly. Continuous verification: the access rights should be verified at every request from subject. Simple design: the design of the security should be simple and uniform. User acceptance: user should not have to spend most of time to protect their files. Multiple condition: system should design in such a fashion that access depends on fulfilling more than one condition.

A UTHENTICATION Authentication is a process of verifying whether person is valid user or not. There are two types of authentication that are possible. Verification of user logging in to centralized system. Authentication of computer that are required to cooperate in a network or distributed environment.

A UTHENTICATION Basis for most type of access control and accountability Two steps Identification Verification

M EANS OF A UTHENTICATION Traditionally listed as three factors Something you know Password, PIN Something you have Card, RFID badge Something you are Biometrics

P ASSWORD -B ASED A UTHENTICATION Determines if user is authorized to access the system Determines privileges for the user Choice of password Password length Salting technique is used for password Additional password Continuous challenge Force password change One time password Disable user

H ASHED P ASSWORDS Widely used technique for storing passwords Secure against a variety of cryptanalytic attacks

UNIX P ASSWORD S CHEME

T OKEN -B ASED A UTHENTICATION ( A RTIFACT BASE ) Objects that a user possesses for the purpose of user authentication are called tokens. Examples include Memory cards Smart cards

S TATIC B IOMETRIC A UTHENTICATION Includes Facial characteristics Fingerprints Hand geometry Retinal pattern Based on pattern recognition, technically complex and expensive.

D YNAMIC B IOMETRIC A UTHENTICATION Patterns may change Includes Iris Signature Voice Typing rhythm

A CCESS C ONTROL Dictates what types of access are permitted, under what circumstances, and by whom. Discretionary access control: control access based on the identity of requestor and on access rule. Mandatory access control: control access based on comparing security labels with security clearance. Role-based access control: control access based on the role that user have.

E XTENDED A CCESS C ONTROL M ATRIX

R OLE B ASED A CCESS C ONTROL Effective implementation of the principle of least privilege Each role should contain the minimum set of access rights needed for that role. A user is assigned to a role that enables him or her to perform what is required for that role. But only while they are performing that role

R OLES

A CCESS C ONTROL M ATRIX R EPRESENTATION OF RBAC