O.S. Security.

Slides:



Advertisements
Similar presentations
Peer-to-Peer vs. Client/Server Network Operating Systems Instructor: Dr. Najla Al-Nabhan
Advertisements

1 Module 1 The Windows NT 4.0 Environment. 2  Overview The Microsoft Operating System Family Windows NT Architecture Overview Workgroups and Domains.
Chapter 12 Reading assignment n From “Running Linux”, on reserve at PSU Main library (2-hour checkout) Chapter 1 (pages 1 through 41)Chapter 1 (pages 1.
1 DOS with Windows 3.1 and 3.11 Operating Environments n Designed to allow applications to have a graphical interface DOS runs in the background as the.
Operating System Security Mike Swift CSE 451 Autumn 2003.
Introduction to Microsoft Windows XP All Trademarks & Copyrights Acknowledged.
 Advantages  Easy to learn  Graphical Advantages  Help and Support  Widely used  Software compatibility  Customisable  Customisable Hardware 
BY : Khader Al-Rasheed  An operating system assembled under the model of free and open source software development and distributions.  it’s.
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
We are here today to know the differences between Windows operating system and Linux operating System And why is windows more famous than Linux Show the.
Week 6 Operating Systems.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
IT Essentials: PC Hardware and Software 1 Chapter 7 Windows NT/2000/XP Operating Systems.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
IC3 Chapter 8 Computer Fundamentals
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Court IT Issues Windows XP Problem April 8, 2014 Microsoft Ends Security Updates April 9, 2014 XP Computers will contract an OS Infection as soon.
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
File System Management File system management encompasses the provision of a way to store your data in a computer, as well as a way for you to find and.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
IT320 OPERATING SYSTEM CONCEPTS Unit 3: Welcome to Linux June 2011 Kaplan University 1.
IT320 OPERATING SYSTEM CONCEPTS Unit 3: Welcome to Linux September 2012 Kaplan University 1.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
Linux-vs-Windows Security
Made By: Micheal Mouner Linux VS Windows. Agenda.
CEG 2400 FALL 2012 Windows Servers Network Operating Systems.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Chapter Nine NetWare-Based Networking. Objectives Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware.
Linux Presentation (‘Lynuks’) The other major alternative is based on the pronunciation of the English version of ‘Linus’. It also happens to be the.
Copyright © 2003 by Prentice Hall 1 Computers: Tools for an Information Age Chapter 3 Operating Systems: Software in the Background BSM025 Computers.
Clouding with Microsoft Azure
Chapter 2 Operating Systems
IT320 Operating System Concepts
Introduction to comp. and prog. CS 101 G 964
Chapter 6: Securing the Cloud
Macintosh & Linux Used to fill in pg 5 & 6 of “Operating Systems” Packet.
Lecture 1-Part 2: Operating-System Structures
Data Security & Business Continuity
Maintaining a Secure and Usable Wireless Network
LINUX WINDOWS Vs..
Network Operating Systems (NOS)
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
BTEC NCF Dip in Comp - Unit 02 Fundamentals of Computer Systems Lesson 03 – Computer Software Mr C Johnston.
Introduction to Networking
LINUX WINDOWS Vs..
What is an Operating System?
NET 311 Information Security
NET 311 Information Security
Best Windows 10 Password Reset Software for Free Trial.
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 5 Mumtaz Ali Rajput +92 – 301-
Shell & Kernel Concepts in Operating System
CE Operating Systems Lecture 21
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
Lecture 1-Part 2: Operating-System Structures
CLOUD COMPUTING.
Module 5- Unit 2 OPERATING COMPUTER SYSTEMS
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
ONLINE SECURE DATA SERVICE
PLANNING A SECURE BASELINE INSTALLATION
Chapter 3 – Operating Systems
Technology 6 Operating Systems.
Objective Understand the concepts of modern operating systems by investigating the most popular operating system in the current and future market Provide.
Chapter 3 Software.
CSE 451: Operating Systems Winter Module 23 Operating System Security
Presentation transcript:

O.S. Security

Safe Sharing Protecting a single computer with one user is easy Prevent everybody else from having access Encrypt all data with a key only one person knows Sharing resources safely is hard Preventing some people from reading private data (e.g. grades) Prevent some people from using too many resources (e.g. disk space) Prevent some people from interfering with other programs (e.g. inserting key strokes / modifying displays)

Why is security hard? Security slows things down Security gets in the way Security adds no value if there are no attacks Only the government used to pay for security The Internet made us all potential victims

Security Techniques Authentication – identifying users and programs Authorization – determining what access users and programs have to things Complete mediation: check every access to every protected object Auditing – record what users and programs are doing for later analysis

Authentication How does a computer know who I am? User name / password How do it store the password? How do it check the password? How secure is a password? Public/Private Keys Biometrics What does the computer do with this information? Assign you an identifier Unix: 32 bit number stored in process structure Windows NT: 27 byte number, stored in an access token in kernel

Background: Windows Advantages Disadvantages User friendly Enhancements can help millions of users Defects found quickly because of widespread use Disadvantages Security defects can leave millions vulnerable Non-technical user-base Industry dominance leaves MS handcuffed - any move to expand capabilities seen as anticompetitive

Windows Security Architecture Security Reference Monitor Local Security Authority Security Account Manager Active Directory Local vs. Domain Accounts Access Control Lists Integrity Control User Account Controls Anyone who wants to understand windows security must have knowledge of the basic fundamental security blocks of security system. There are many components in windows that make up the fundamental security infrastructure.

Background: Linux Advantages Disadvantages Stability Free Software Runs on old hardware Security Disadvantages Learning curve Equivalent programs More technical ability needed Not all hardware compatible Advantages: The majority of Linux variants are available for free or at a much lower price than Microsoft Windows. Linux is and has always been a very secure Operating System. Although it still can be attacked when compared to Windows, it much more secure. The majority of Linux variants and versions are notoriously reliable and can often run for months and years without needing to be rebooted Disadvantages: Although the majority Linux variants have improved dramatically in ease of use, Windows is still much easier to use for new computer users Linux has a large variety of available software programs, utilities, and games. However, Windows has a much larger selection of available software. Required someone who knows Linux really well. Alternately, you could hire someone who has experience with Linux. A good Linux administrator needs to be on hand as you start to migrate your systems over. This is a disadvantage financially, at least in the beginning. Some of the latest and greatest hardware that is being produced is not compatible with Linux. One thing you can do is before your purchase, ask if the hardware vendor has support for Linux. Some manufacturers do write their own Linux drivers and distribute them with your purchase, making it very easy to integrate with your existing system.

THANK YOU!!!!