Operating System Security & Smartphones

Slides:



Advertisements
Similar presentations
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Advertisements

Is There a Security Problem in Computing? Network Security / G. Steffen1.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
What we will cover… Protection and Security in OS.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CS 149: Operating Systems April 30 Class Meeting Department of Computer Science San Jose State University Spring 2015 Instructor: Ron Mak
Operating Systems Protection & Security.
Security Exploiting Overflows. Introduction r See the following link for more info: operating-systems-and-applications-in-
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Protection.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Computer & Network Security
Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since.
Operating system Security By Murtaza K. Madraswala.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Systems II San Pham CS /20/03. Topics Operating Systems Resource Management – Process Management – CPU Scheduling – Deadlock Protection/Security.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Protection (Chapter 14)
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
Chap1: Is there a Security Problem in Computing?.
Operating Systems Security
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Presented by: Dr. Munam Ali Shah
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14a: Security I.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Securing Information Systems
Types of security violation –
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Chapter 15: Security.
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
Chapter 15: Security Source & Copyright: Operating System Concepts, Silberschatz, Galvin and Gagne.
Network security threats
Security Shmuel Wimer prepared and instructed by
Operating system Security
Chapter 6: Protection & Security
Chapter 14: Protection.
Chapter 14: Protection Source & Copyright: Operating System Concepts, Silberschatz, Galvin and Gagne.
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Risk of the Internet At Home
Chapter 15: Security.
12: Security The Security Problem Authentication Program Threats
Home Internet Vulnerabilities
Chapter 14: Protection.
INFORMATION SYSTEMS SECURITY and CONTROL
Unit VI part 2: Protection & Security
How to Mitigate the Consequences What are the Countermeasures?
Faculty of Science IT Department By Raz Dara MA.
Chapter 14: Protection.
Security.
Chapter 14: Protection.
Operating System Concepts
Chapter # 3 COMPUTER AND INTERNET CRIME
Chapter 14: Protection.
Chapter 14: Protection.
Operating System Concepts
Chapter 14: Protection.
Chapter 14: Protection.
Presentation transcript:

Operating System Security & Smartphones Md Shahrear Iqbal PhD student QRST Lab, School of computing queen’s university, Kingston, Ontario, Canada.

CISC 324: Security & Protection

Concepts Protection: Security: Mechanisms and policy to keep programs and users from accessing or changing stuff they should not do Internal to OS Chapter 14 in Silbershatz Security: Issues external to OS Authentication of user, validation of messages, malicious or accidental introduction of flaws, etc. Chapter 15 of Silbershatz

Goals of Protection In one protection model, computer consists of a collection of objects, hardware or software Each object has a unique name and can be accessed through a well- defined set of operations Protection problem - ensure that each object is accessed correctly and only by those processes that are allowed to do so Slides from Operating System Concepts – 9th Edition, Silberschatz, Galvin, Gagne

Principles of Protection Guiding principle – principle of least privilege Programs, users and systems should be given just enough privileges to perform their tasks Limits damage if entity has a bug, gets abused Can be static (during life of system, during life of process) Or dynamic (changed by process as needed) – domain switching, privilege escalation “Need to know” a similar concept regarding access to data Slides from Operating System Concepts – 9th Edition, Silberschatz, Galvin, Gagne

Principles of Protection (Cont.) Must consider “grain” aspect Rough-grained privilege management easier, simpler, but least privilege now done in large chunks For example, traditional Unix processes either have abilities of the associated user, or of root Fine-grained management more complex, more overhead, but more protective File ACL lists, RBAC Domain can be user, process, procedure Slides from Operating System Concepts – 9th Edition, Silberschatz, Galvin, Gagne

The Security Problem System secure if resources used and accessed as intended under all circumstances Unachievable Intruders (crackers) attempt to breach security Threat is potential security violation Attack is attempt to breach security Attack can be accidental or malicious Easier to protect against accidental than malicious misuse Slides from Operating System Concepts – 9th Edition, Silberschatz, Galvin, Gagne

Security Violation Categories Breach of confidentiality Unauthorized reading of data Breach of integrity Unauthorized modification of data Breach of availability Unauthorized destruction of data Theft of service Unauthorized use of resources Denial of service (DOS) Prevention of legitimate use Slides from Operating System Concepts – 9th Edition, Silberschatz, Galvin, Gagne

Security Measure Levels Impossible to have absolute security, but make cost to perpetrator sufficiently high to deter most intruders Security must occur at four levels to be effective: Physical Data centers, servers, connected terminals Human Avoid social engineering, phishing, dumpster diving Operating System Protection mechanisms, debugging Network Intercepted communications, interruption, DOS Security is as weak as the weakest link in the chain But can too much security be a problem? Slides from Operating System Concepts – 9th Edition, Silberschatz, Galvin, Gagne

Program Threats Many variations, many names Trojan Horse Trap Door Code segment that misuses its environment Exploits mechanisms for allowing programs written by users to be executed by other users Spyware, pop-up browser windows, covert channels Up to 80% of spam delivered by spyware-infected systems Trap Door Specific user identifier or password that circumvents normal security procedures Could be included in a compiler How to detect them? Slides from Operating System Concepts – 9th Edition, Silberschatz, Galvin, Gagne

Program Threats (Cont.) Logic Bomb Program that initiates a security incident under certain circumstances Stack and Buffer Overflow Exploits a bug in a program (overflow either the stack or memory buffers) Failure to check bounds on inputs, arguments Write past arguments on the stack into the return address on stack When routine returns from call, returns to hacked address Pointed to code loaded onto stack that executes malicious code Unauthorized user or privilege escalation Slides from Operating System Concepts – 9th Edition, Silberschatz, Galvin, Gagne

Smartphone Security

Security Risks Asset

Security Risks Asset Threat Hacker Malware

Security Risks Vulnerable Operating Systems Vulnerable Apps New Technologies Asset Threat Vulnerability Risk malware

Existing Security for fighting Malware

Smart City Smart City Smart People Smart Econ. Smart Env. Smart Gov. Smart Living Smart Mobility Embrace creativity Inclusive society 21st century education Entrepreneurship & innovation Productivity Local & global interconnectedness Green buildings Green energy Green urban planning Enabling supply & demand side policy Transportation & open data Healthy ICT & eGov Safe Culturally vibrant & happy Clean & non-motorized options Integrated ICT Mixed-modal access Government: exercise control over the actions of the members, citizens, or inhabitants of communities, societies, and states a native or naturalized member of a state or nation who owes allegiance to its government and is entitled to its protection(distinguished from alien ). 2.an inhabitant of a city or town, especially one entitled to its privileges or franchises. A smart city (also smarter city) uses digital technologies to enhance performance and well being, to reduce costs and resource consumption, and to engage more effectively and actively with its citizens Key enabling technologies for Smart Cities include the Internet of Things (IoT), public Wi-Fi, ubiquitous cellular coverage and smartphone apps.   Smartphone and smartphone apps, will be the face of the Smart City and bridge the users to the Internet of Things (IoT) devices, information, services and the community.    Smart City mobile applications are cornerstones of a Smart City.  

Smartphone Smart Country Smart Security Framework Smart communication API for apps Prevention Monitor and Control Framework management API for anti-virus Provide custom monitors Maintaining separate execution profiles Reporting suspicious activity Execution zones Service providers Security modes Smart communication Data safety Surveillance Behavioral analysis and detection Controlling malware Offload computation Maintain a list of trusted devices Maintain application status Smart Phone Report malware Maintain device context Maintain relationship between apps Fine-grained access control Smart Country Smart Security Framework

Implementation View Applications Application framework Restricted Zone New App Zone Trusted App Zone Untrusted App Zone High Privilege App Zone App 6 App 8 App 1 App 2 App 3 App 5 App 4 App 7 Zone and Policy Manager App Market Application framework Secure Communication K Application Status and Relationship Management Context Management Package Installer Policy Management Permission Checker Trusted Device Management Computation Offloading Management Security Mode Management High Privilege App Service Provider Zone Management Data Safety Management API Management Hardware OS Sensors App Behavior Surveillance Custom Telephony/SMS Communication Channels K

Job & Grad Life

Questions