CS703 - Advanced Operating Systems

Slides:



Advertisements
Similar presentations
Interactive lesson about operating system
Advertisements

Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Common System Components
G Robert Grimm New York University Protection and the Control of Information Sharing in Multics.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Systems Security & Audit Operating Systems security.
Lecture 18 Page 1 CS 111 Online Access Control Security could be easy – If we didn’t want anyone to get access to anything The trick is giving access to.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Protection and Security Questions answered in this lecture: How can a system authenticate a user? How are access rights specified? What are common security.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Protection (Chapter 14)
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
Security CS Introduction to Operating Systems.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Multics CysecLab Graduate School of Information Security KAIST.
Lecture 18 Page 1 CS 111 Online OS Use of Access Control Operating systems often use both ACLs and capabilities – Sometimes for the same resource E.g.,
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
Computer Security: Principles and Practice
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
CSCE 201 Identification and Authentication Fall 2015.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
1 Chapter 12: Design Principles Overview –There are principles for many kinds of design Generally, a design should consider: Balance, Rhythm, Proportion,
June 1, 2004© Matt Bishop [Changed by Hamid R. Shahriari] Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Protection and Security
HTCondor Security Basics
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: System Protection
Chapter 6 Integrity Policies
Operating System Structure
CS703 - Advanced Operating Systems
Operating Systems Security
12: Security The Security Problem Authentication Program Threats
CE Operating Systems Lecture 21
HTCondor Security Basics HTCondor Week, Madison 2016
CS Introduction to Operating Systems
Chapter 2: Operating-System Structures
Security.
Chapter 14: Protection.
Chapter 14: Protection.
Outline Chapter 2 (cont) OS Design OS structure
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Operating System Concepts
CSE 153 Design of Operating Systems Winter 2019
CS703 - Advanced Operating Systems
CS703 - Advanced Operating Systems
Designing IIS Security (IIS – Internet Information Service)
Chapter 2: Operating-System Structures
Access Control What’s New?
Chapter 5 File Systems -Compiled for MCA, PU
Presentation transcript:

CS703 - Advanced Operating Systems By Mr. Farhan Zaidi

Lecture No. 39

Overview of today’s lecture Introduction to security and protection Security issues Policy vs Mechanism Design principles for security Security requirements Security related terminology Introduction to user authentication

Security & Protection The purpose of a protection system is to prevent accidental or intentional misuse of a system Accidents A program mistakenly deletes the root directory. No one can login. This sort of problem (relatively) easy to solve: just make the likelihood small. Malicious abuse: A high school hacker breaks the password for user B of accounting system A and transfers $3 million to his account. This kind of problem very hard to completely eliminate (no loopholes, can’t play on probabilities)

Security issues Separate processes execute in separate memory space Isolation Separate processes execute in separate memory space Process can only manipulate allocated pages Authentication Who can access the system. Involves proving identities to the system Access control When can process create or access a file? Create or read/write to socket? Make a specific system call? Protection problem Ensure that each object is accessed correctly and only by those processes that are allowed to do so Comparison between different operating systems Compare protection models: which model supports least privilege most effectively? Which system best enforces its protection model?

Policy versus mechanism A good way to look at the problem is to separate policy (what) from mechanism (how) A protection system is the mechanism to enforce a security policy roughly the same set of choices, no matter what policy A security policy delineates what acceptable behavior and unacceptable behavior. Example security policies: that each user can only allocate 40MB of disk that no one but root can write to the password file that you can’t read my mail.

There is no perfect protection system Very simple point, very easy to miss: Protection can only increase the effort (“work factor”) needed to do something bad. It cannot prevent it. Even assuming a technically perfect system, there are always the four Bs: Burglary: if you can’t break into my system, you can always steal it (called “physical security”) Bribery: find whoever has access to what you want and bribe them. Blackmail. Bludgeoning. Or just beat them until they tell you.

Design Principles for Security System design should be public Default should be no access Check for current authority Give each process least privilege possible Protection mechanism should be simple uniform in lowest layers of system Scheme should be psychologically acceptable

Terminology I: the entities Principals – who is acting? User / Process Creator Code Author Objects – what is that principal acting on? File Network connection Rights – what actions might you take? Read Write Familiar UNIX file system example: owner / group / world read / write / execute

Terminology II: the activities Authentication – who are you? identifying principals (users / programs) Authorization – what are you allowed to do? determining what access users and programs have to specific objects Auditing – what happened record what users and programs are doing for later analysis / prosecution

User Authentication Basic Principles. Authentication must identify: Something the user knows Something the user has Something the user is This is done before user can use the system