Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.

Slides:



Advertisements
Similar presentations
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
Advertisements

Password Cracking Lesson 10. Why crack passwords?
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
CSUF Chapter CSUF Operating Systems Security 2.
The Operating System. What is an Operating System? The software which makes it possible for you to use your computer The software which starts up when.
EEE 435 Principles of Operating Systems Operating System Concepts (Modern Operating Systems 1.5)
Section 3.2: Operating Systems Security
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Building Secure Software Chapter 9 Race Conditions.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
The Impact of Physical Security on Network Security
Computer Organization
Configuration Overview The BIOS (basic input/output system) is an important motherboard component. The BIOS has the following functions: Holds and executes.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Enforcing Concurrent Logon Policies with UserLock.
CS 1308 Computer Literacy and the Internet. Introduction  Von Neumann computer  “Naked machine”  Hardware without any helpful user-oriented features.
Laface Operating System Design Booting a PC to run a kernel from Low memory VGA display.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chapter 3.2: Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as.
Chapter 3 Partitioning Drives using NTFS and FAT32 Prepared by: Khurram N. Shamsi.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Security CS Introduction to Operating Systems.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Windows XP & Vista Memory Management
1 Software. 2 What is software ► Software is the term that we use for all the programs and data on a computer system. ► Two types of software ► Program.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Operating Systems Security
Chapter 3 Operating Systems. © 2005 Pearson Addison-Wesley. All rights reserved 3-2 Chapter 3 Operating Systems 3.1 The Evolution of Operating Systems.
W elcome to our Presentation. Presentation Topic Virus.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems.
IT Chapter 2 Part A How Computers Work Input, process, output, and storage The operating system helps the computer perform four basic operations,
Nat 4/5 Computing Science Software
Presented by Kartik Patel
Trusted Computing and the Trusted Platform Module
CS101 Booting A Computer.
Chapter 1: Introduction
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
CIT 480: Securing Computer Systems
Chapter 2: System Structures
TOPIC 6: SYSTEM START-UP AND CONFIGURATION
Introduction to Operating System (OS)
Computer System Structures
Outline What does the OS protect? Authentication for operating systems
Operating Systems Concepts
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 5 Mumtaz Ali Rajput +92 – 301-
Starting the computer. Every day we are using an operating system and most specifically a Windows operating system but most of us are not aware of the.
Hiding Information, Encryption, and Bypasses
The Operating system Gives life to the hardware
BIOS Chapter 6.
Operating Systems Tasks 17/02/2019.
Chapter 3: Operating Systems
Outline Chapter 2 (cont) OS Design OS structure
Modern PC operating systems
Chapter 3: Operating Systems
Chapter 3: Operating Systems
TPM, UEFI, Trusted Boot, Secure Boot
Chapter 3: Operating Systems
Presentation transcript:

Operating Systems Security 1

The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or bootstrapping. When a computer is turned on, it first executes code stored in a firmware component known as the BIOS (basic input/output system). On modern systems, the BIOS loads into memory the second-stage boot loader, which handles loading the rest of the operating system into memory and then passes control of execution to the operating system. 2

BIOS Passwords A malicious user could potentially seize execution of a computer at several points in the boot process. To prevent an attacker from initiating the first stages of booting, many computers feature a BIOS password that does not allow a second- stage boot loader to be executed without proper authentication. 3

Hibernation Modern machines have the ability to go into a powered-off state known as hibernation. While going into hibernation, the OS stores the contents of machine’s memory into a hibernation file (such as hiberfil.sys) on disk so the computer can be quickly restored later. But… without additional security precautions, hibernation exposes a machine to potentially invasive forensic investigation User closes a laptop computer, putting it into hibernation. 2. Attacker copies the hiberfil.sys file to discover any unencrypted passwords that were stored in memory when the computer was put into hibernation.

Event Logging Keeping track of what processes are running, what other machines have interacted with the system via the Internet, and if the operating system has experienced any unexpected or suspicious behavior can often leave important clues not only for troubleshooting ordinary problems, but also for determining the cause of a security breach. 5

Process Explorer 6

us/sysinternals/bb us/sysinternals/bb rthAmerica/2010/WCL315 (10:00) rthAmerica/2010/WCL315 _6?url=search-alias%3Daps&field- keywords=sysinternals&sprefix=sysint _6?url=search-alias%3Daps&field- keywords=sysinternals&sprefix=sysint 7

Memory and File System Security 8 The contents of a computer are encapsulated in its memory and file system. Thus, protection of a computer’s content has to start with the protection of its memory and its file system.

Password Security The basic approach to guessing passwords from the password file is to conduct a dictionary attack, where each word in a dictionary is hashed and the resulting value is compared with the hashed passwords stored in the password file. A dictionary of 500,000 “words” is often enough to discover most passwords. 9

Password Salt One way to make the dictionary attack more difficult to launch is to use salt. Associate a random number with each userid. Rather than comparing the hash of an entered password with a stored hash of a password, the system compares the hash of an entered password and the salt for the associated userid with a stored hash of the password and salt. 10

How Password Salt Works 11 Without salt: With salt: 1. User types userid, X, and password, P. 2. System looks up H, the stored hash of X’s password. 3. System tests whether h(P) = H. 1. User types userid, X, and password, P. 2. System looks up S and H, where S is the random salt for userid X and H is stored hash of S and X’s password. 3. System tests whether h(S||P) = H. … X: H … Password file: … X: S, H … Password file:

How Salt Increases Search Space Size Assuming that an attacker cannot find the salt associated with a userid he is trying to compromise, then the search space for a dictionary attack on a salted password is of size 2 B *D, where B is the number of bits of the random salt and D is the size of the list of words for the dictionary attack. For example, if a system uses a 32-bit salt for each userid and its users pick passwords in a 500,000 word dictionary, then the search space for attacking salted passwords would be 2 32 * 500,000 = 2,147,483,648,000,000, which is over 2 quadrillion. Also, even if an attacker can find a salt password for a userid, he only learns one password. 12