Operating system Security

Slides:



Advertisements
Similar presentations
Chapter 15 Computer Security Techniques
Advertisements

Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Chapter 15 Security Bernard Chen Spring Protection vs. Security Protection (Ch.14) deals with internal problem Security (Ch. 15) Deals with external.
Security  The Security Problem  Authentication  Program Threats  System Threats  Securing Systems  Intrusion (unwanted involvement) Detection  Encryption.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Operating Systems Protection & Security.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
BUSINESS B1 Information Security.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Operating Systems 1 K. Salah Module 6.0: Security and Protection  Types of misuse: –1. Accidental –2. Intentional –Protection is to prevent either accidental.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Operating system Security By Murtaza K. Madraswala.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Systems II San Pham CS /20/03. Topics Operating Systems Resource Management – Process Management – CPU Scheduling – Deadlock Protection/Security.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection System
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14a: Security I.
Some Great Open Source Intrusion Detection Systems (IDSs)
Security Methods and Practice CET4884
Security Issues in Information Technology
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Access control techniques
Information System and Network Security
Network security threats
Goals of protection Protection is required to prevent mischievous, intentional violation of an access restriction by a user. The use of system resources.
Security Shmuel Wimer prepared and instructed by
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Security in Networking
12: Security The Security Problem Authentication Program Threats
Operating System Security
Faculty of Science IT Department By Raz Dara MA.
Security.
Intrusion Detection system
Operating System Concepts
Chapter # 3 COMPUTER AND INTERNET CRIME
Operating System Concepts
CSE 542: Operating Systems
Chapter Goals Discuss the CIA triad
Chapter 14: Protection.
Presentation transcript:

Operating system Security By Murtaza K. Madraswala

Protection Control access by limiting file types accessed by different users Only authorized processes can operate on memory segments, CPU and other resources

Security Protect information integrity by ensuring authentication of system users Prevent unauthorized access Prevent malicious destruction of data Prevent accidental introduction of inconsistency

Security vs. Protection Security takes into consideration the protection system which is strictly internal, as well as the external environment in which the system operates Security violations can be malicious or accidental

Security (Contd.) Malicious violations Unauthorized reading of data Unauthorized writing of data Unauthorized destruction of data Preventing legitimate system use (Denial of service)

Four levels of security measures Security (Contd.) Four levels of security measures Physical – Physical protection of the computer system Human – Screening of users given access to the computer system Network Operating System – OS must be capable of protecting itself from accidental or intentional security breaches

Operating System Security User authentication Based on User possession (of key or card) User knowledge (user identifier + password) User attribute (fingerprint, retina pattern, signature)

Passwords Biometrics Password vulnerabilities Encrypted passwords One-Time passwords Biometrics

Program Threats A program written by one user and used by another may cause unexpected behavior Trojan horse – This problem is created by the operating system which allows the programs written by one user to be executed by another This is a code segment that can misuse it environment

Program Threats (contd.) Trap door Stack and buffer overflow

System threats Most operating systems allow processes to spawn other processes. This creates situations in which operating system resources and files are misused

System threats (Contd.) Worms Worms are programs that reduce system performance by spawning copies of themselves repeatedly, locking out system use by all other processes. In a network worms may reproduce across systems and bring down the entire network

System threats (Contd.) Viruses A virus is a fragment of code embedded in a legitimate program. It is capable of modifying/destroying files, causing program malfunctions and system crashes.

System threats (Contd.) Denial of Service The focus of this attack is to disable the legitimate use of a system/facility rather than gaining information or stealing resources

Intrusion detection Strives to detect attempted or successful intrusions into a computer system, and initiate a proper response. Two approaches: Signature-based detection – Here system input or traffic is examined for specific behavior patterns Anomaly detection – This approach attempts to detect anomalous behavior within the computer system.

Intrusion detection (Contd.) Signature-based detection attempts to characterize dangerous behavior and detects when such behavior occurs Anomaly detection attempts to characterize normal behaviors and detects when something abnormal occurs

Intrusion detection (Contd.) Auditing and logging In audit-trail processing, security relevant events are logged to an audit trail and matched against attack signatures (signature-based detection) or analyzed for anomalous behavior (anomaly detection)

Intrusion detection (Contd.) System-Call Monitoring Process system calls are monitored to detect instances when a process deviates from the expected system-call behavior Attacks that attempt to take over a process by exploiting the buffer-overflow vulnerability, and execute the attacker’s code rather than the original code can be detected using this technique

References Silberschatz, Galvin & Gagne, Operating System Concepts (6 ed.), John Wiley and Sons R. Summers, Secure Computing – Threats and Safeguards, McGraw-Hill M. Milenkovic, Operating Systems – Concepts and Designs, McGraw-Hill W. Stallings, Operating Systems – Internals and Design Principles, Prentice Hall