Chapter 15: Security.

Slides:



Advertisements
Similar presentations
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
Advertisements

Chapter 15 Security Bernard Chen Spring Protection vs. Security Protection (Ch.14) deals with internal problem Security (Ch. 15) Deals with external.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
Chapter 15: Security. The Security Problem Security must consider external environment of the system, and protect the system resources Intruders (crackers)
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Security. The Security Problem Security must consider external environment of the system, and protect the system resources Intruders (crackers) attempt.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Chapter 15: Security Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Chapter 15: Security The Security.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CS 149: Operating Systems April 30 Class Meeting Department of Computer Science San Jose State University Spring 2015 Instructor: Ron Mak
15.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 The Security Problem Security must consider external environment.
13.1 Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Security.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Network Security CSC332. Dr. Munam Ali Shah PhD: University of Bedfordshire MS: University of Surrey M.Sc: University of Peshawar Serving COMSATS since.
Operating system Security By Murtaza K. Madraswala.
System Security. The Security Problem Security must consider external environment of the system, and protect the system resources Intruders (crackers)
Chapter 15: Security. 15.2CSCI Operating Systems Chapter 15: Security The Security Problem Program Threats System and Network Threats Cryptography.
1 Lecture 11 protection and Security Operating System Fall 2005.
Chapter 15: Security Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Chapter 15: Security The Security.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
Chapter 15: Security Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 15: Security The Security Problem Program Threats System.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 15: System Security.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 15: Security.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Operating System Concepts with Java – 7 th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne ©2007 Chapter 15: Security.
CSE Operating System Principles Security. CSE – Operating System Principles2 Security The Security Problem Program Threats System and Network.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14a: Security I.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition Chapter 15: Security.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14b: Security II.
Chapter 15: Security Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Chapter 15: Security The Security.
SECURITY.
Chapter 40 Internet Security.
Securing Information Systems
Threat Modeling for Cloud Computing
Types of security violation –
Chapter 15: Security.
Operating System Security & Smartphones
Chapter 15: Security Source & Copyright: Operating System Concepts, Silberschatz, Galvin and Gagne.
Secure Software Confidentiality Integrity Data Security Authentication
Secure Sockets Layer (SSL)
Cryptographic Hash Function
Goals of protection Protection is required to prevent mischievous, intentional violation of an access restriction by a user. The use of system resources.
Security Shmuel Wimer prepared and instructed by
Operating system Security
Chapter 15: Security Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 6: Protection & Security
Security in Networking
Chapter 15: Security - Objectives
Chapter 15: Security.
EECE.4810/EECE.5730 Operating Systems
12: Security The Security Problem Authentication Program Threats
Unit VI part 2: Protection & Security
Faculty of Science IT Department By Raz Dara MA.
Security.
Operating Systems: The course
Operating System Concepts
Operating System Concepts
Test 3 review FTP & Cybersecurity
Chapter 14: Protection.
Presentation transcript:

Chapter 15: Security

Chapter 15: Security The Security Problem Program Threats System and Network Threats Cryptography as a Security Tool User Authentication Implementing Security Defenses Firewalling to Protect Systems and Networks Computer-Security Classifications An Example: Windows 7

Objectives To discuss security threats and attacks To explain the fundamentals of encryption, authentication, and hashing To examine the uses of cryptography in computing To describe the various countermeasures to security attacks

Security Violation Categories Breach of confidentiality Unauthorized reading of data Breach of integrity Unauthorized modification of data Breach of availability Unauthorized destruction of data Theft of service Unauthorized use of resources Denial of service (DOS) Prevention of legitimate use

Security Violation Methods Masquerading (breach authentication) Pretending to be an authorized user to escalate privileges Replay attack As is or with message modification Man-in-the-middle attack Intruder sits in data flow, masquerading as sender to receiver and vice versa Session hijacking Intercept an already-established session to bypass authentication

Security Measure Levels Impossible to have absolute security, but make cost to perpetrator sufficiently high to deter most intruders Security must occur at four levels to be effective: Physical Data centers, servers, connected terminals Human Avoid social engineering, phishing, dumpster diving Operating System Protection mechanisms, debugging Network Intercepted communications, interruption, DOS Security is as weak as the weakest link in the chain But can too much security be a problem?

Program Threats Many variations, many names Trojan Horse Code segment that misuses its environment Exploits mechanisms for allowing programs written by users to be executed by other users Spyware, pop-up browser windows, covert channels Up to 80% of spam delivered by spyware-infected systems Trap Door Specific user identifier or password that circumvents normal security procedures Could be included in a compiler How to detect them?

Program Threats (Cont.) Logic Bomb Program that initiates a security incident under certain circumstances Stack and Buffer Overflow Exploits a bug in a program (overflow either the stack or memory buffers) Failure to check bounds on inputs, arguments Write past arguments on the stack into the return address on stack When routine returns from call, returns to hacked address Pointed to code loaded onto stack that executes malicious code Unauthorized user or privilege escalation

C Program with Buffer-overflow Condition #include <stdio.h> #define BUFFER SIZE 256 int main(int argc, char *argv[]) { char buffer[BUFFER SIZE]; if (argc < 2) return -1; else { strcpy(buffer,argv[1]); return 0; }

Hypothetical Stack Frame Before attack After attack

Program Threats (Cont.) Viruses Code fragment embedded in legitimate program Self-replicating, designed to infect other computers Very specific to CPU architecture, operating system, applications Usually borne via email or as a macro Visual Basic Macro to reformat hard drive Sub AutoOpen() Dim oFS Set oFS = CreateObject(’’Scripting.FileSystemObject’’) vs = Shell(’’c:command.com /k format c:’’,vbHide) End Sub

The Morris Internet Worm

System and Network Threats (Cont.) Port scanning Automated attempt to connect to a range of ports on one or a range of IP addresses Detection of answering service protocol Detection of OS and version running on system nmap scans all ports in a given IP range for a response nessus has a database of protocols and bugs (and exploits) to apply against a system Frequently launched from zombie systems To decrease trace-ability

System and Network Threats (Cont.) Denial of Service Overload the targeted computer preventing it from doing any useful work Distributed denial-of-service (DDOS) come from multiple sites at once Consider the start of the IP-connection handshake (SYN) How many started-connections can the OS handle? Consider traffic to a web site How can you tell the difference between being a target and being really popular? Accidental – CS students writing bad fork() code Purposeful – extortion, punishment

Cryptography as a Security Tool Broadest security tool available Internal to a given computer, source and destination of messages can be known and protected OS creates, manages, protects process IDs, communication ports Source and destination of messages on network cannot be trusted without cryptography Local network – IP address? Consider unauthorized host added WAN / Internet – how to establish authenticity Not via IP address

Cryptography Means to constrain potential senders (sources) and / or receivers (destinations) of messages Based on secrets (keys) Enables Confirmation of source Receipt only by certain destination Trust relationship between sender and receiver

Secure Communication over Insecure Medium

Encryption using RSA Asymmetric Cryptography Distribute public key K5,91

Authentication – Hash Functions Basis of authentication Creates small, fixed-size block of data message digest (hash value) from m Hash Function H must be collision resistant on m Must be infeasible to find an m’ ≠ m such that H(m) = H(m’) If H(m) = H(m’), then m = m’ The message has not been modified Common message-digest functions include MD5, which produces a 128-bit hash, and SHA-1, which outputs a 160-bit hash Not useful as authenticators For example H(m) can be sent with a message But if H is known someone could modify m to m’ and recompute H(m’) and modification not detected So must authenticate H(m)

Authentication (Cont.) Why authentication if a subset of encryption? Fewer computations (except for RSA digital signatures) Authenticator usually shorter than message Sometimes want authentication but not confidentiality Signed patches et al Can be basis for non-repudiation

Key Distribution Delivery of symmetric key is huge challenge Sometimes done out-of-band Asymmetric keys can proliferate – stored on key ring Even asymmetric key distribution needs care – man-in-the-middle attack

Implementation of Cryptography Can be done at various layers of ISO Reference Model SSL at the Transport layer Network layer is typically IPSec IKE for key exchange Basis of Virtual Private Networks (VPNs) Why not just at lowest level? Sometimes need more knowledge than available at low levels i.e. User authentication i.e. e-mail delivery Source: http://en.wikipedia.org/wiki/OSI_model

Implementing Security Defenses Defense in depth is most common security theory – multiple layers of security Security policy describes what is being secured Vulnerability assessment compares real state of system / network compared to security policy Intrusion detection endeavors to detect attempted or successful intrusions Signature-based detection spots known bad patterns Anomaly detection spots differences from normal behavior Can detect zero-day attacks False-positives and false-negatives a problem Virus protection Searching all programs or programs at execution for known virus patterns Or run in sandbox so can’t damage system Auditing, accounting, and logging of all or specific system or network activities Practice safe computing – avoid sources of infection, download from only “good” sites, etc

Other Concepts (Secure) Multi-Party Computation N parties compute a function together without sharing inputs e.g. cross-referencing flight passenger manifests with suspect lists Homomorphic Encryption F(enc(A), enc(B)) = enc(F(A, B)) e.g. Querying encrypted databases Safe, Narrow AI Federated ML, anonymous, local training on private data, e.g. OpenMined.org For a good introduction to MPC/Homomorphic Encryption, see youtube lectures (part 1 and 2) from Technion, IL: https://www.youtube.com/watch?v=NOtsxHoIcWQ See also Ivan Damgård from Aarhus Univ. on Google scholar.

End of Chapter 15