Section 3.2: Operating Systems Security

Slides:



Advertisements
Similar presentations
COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 3 Operating Systems.
Advertisements

Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
Password Cracking Lesson 10. Why crack passwords?
Live CDs. What is a Live CD? Prerak Parikh What is a Live CD? CD or DVD containing bootable CD-ROM disk that loads and boots an OS Instead of using the.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
CSUF Chapter CSUF Operating Systems Security 2.
Chapter 3 Understanding the Boot Process and Command Line.
Chapter 11 Exploring Windows XP Vol. 1 Part One - Windows XP Professional: The Basics.
Building Secure Software Chapter 9 Race Conditions.
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Capturing Computer Evidence Extracting Information.
The Impact of Physical Security on Network Security
TC2-Computer Literacy Mr. Sencer February 8, 2010.
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Linux+ Guide to Linux Certification Chapter Three Linux Installation and Usage.
Your Interactive Guide to the Digital World Discovering Computers 2012.
By, Anish Shanmugasundaram Yashwanth Sainath Jammi.
Tutorial 11 Installing, Updating, and Configuring Software
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 14 Managing and Troubleshooting Windows 2000.
SYSTEM SOFTWARE Prepared by: Mrs. Careene McCallum-Rodney.
Section 3.1: Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random.
Laface Operating System Design Booting a PC to run a kernel from Low memory VGA display.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Chapter 3.2: Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
1 Software. 2 What is software ► Software is the term that we use for all the programs and data on a computer system. ► Two types of software ► Program.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Computer Software Operating Systems – Programs. Computer Language - Review We learnt that computers are made up of millions of tiny switches that can.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
Operating Systems Security
W elcome to our Presentation. Presentation Topic Virus.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
UNIX U.Y: 1435/1436 H Operating System Concept. What is an Operating System?  The operating system (OS) is the program which starts up when you turn.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
IT Chapter 2 Part A How Computers Work Input, process, output, and storage The operating system helps the computer perform four basic operations,
Copyright © 2003 by Prentice Hall 1 Computers: Tools for an Information Age Chapter 3 Operating Systems: Software in the Background BSM025 Computers.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Nat 4/5 Computing Science Software
Chapter Objectives In this chapter, you will learn:
Presented by Kartik Patel
Trusted Computing and the Trusted Platform Module
Trusted Computing and the Trusted Platform Module
CIT 480: Securing Computer Systems
Password Cracking Lesson 10.
TOPIC 6: SYSTEM START-UP AND CONFIGURATION
TexPREP Summer Camp Computer Science
Introduction to Computers
What is an Operating System?
Operating Systems Concepts
CONFIGURING HARDWARE DEVICE & START UP PROCESS
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 5 Mumtaz Ali Rajput +92 – 301-
Starting the computer. Every day we are using an operating system and most specifically a Windows operating system but most of us are not aware of the.
The Operating system Gives life to the hardware
Operating Systems Tasks 17/02/2019.
Bethesda Cybersecurity Club
Modern PC operating systems
TPM, UEFI, Trusted Boot, Secure Boot
The bios.
Presentation transcript:

Section 3.2: Operating Systems Security Introduction 4/15/2017 Section 3.2: Operating Systems Security

The Boot Sequence When a computer is turned on, it first executes code stored in a firmware component known as the BIOS (basic input/output system). On modern systems, the BIOS loads into memory the second-stage boot loader, which handles loading the rest of the operating system into memory and then passes control of execution to the operating system.

BIOS Passwords A malicious user could potentially seize execution of a computer at several points in the boot process. Live CD attack: attackers use a bootable external media to boot up a computer in order to obtain hard drive data. Original OS cannot protect data anymore.

BIOS Passwords BIOS password: that does not allow a second-stage boot loader to be executed without proper authentication. Set up hard drive as the first boot device Prevent BIOS editing without the password Attackers can remove HD, install it in another computer to boot up A better defense is to use hard disk encryption

Hibernation Modern machines have the ability to go into a powered-off state known as hibernation. OS stores the contents of machine’s memory into a hibernation file (such as hiberfil.sys) on disk so the computer can be quickly restored later. But… without additional security precautions, hibernation exposes a machine to potentially invasive forensic investigation. 1. User closes a laptop computer, putting it into hibernation. 2. Attacker copies the hiberfil.sys file to discover any unencrypted passwords that were stored in memory when the computer was put into hibernation.

Event Logging Keeping track of what processes are running, what other machines have interacted with the system via the Internet, and if the operating system has experienced any unexpected or suspicious behavior can often leave important clues not only for troubleshooting ordinary problems, but also for determining the cause of a security breach.

Process Explorer Download from: http://technet.microsoft.com/en-us/sysinternals/bb896653 Provides more detailed information of processes than Windows Task Manager

Password Security Instead of storing passwords as plaintext, most OSes store the hash values in password files. Dictionary attack: with obtained password file, each word in a dictionary is hashed and the resulting value is compared with the hashed passwords stored in the password file. A dictionary of 500,000 “words” is often enough to discover most passwords.

Password Salt One way to make the dictionary attack more difficult to launch is to use salt. Associate a random number with each user id. OS compares the hash of (password+salt) with the stored hash of the (password+salt). Unix system password file: /etc/passwd Possible conjunction with /etc/shadow

How Password Salt Works Without salt: Password file: 1. User types userid, X, and password, P. 2. System looks up H, the stored hash of X’s password. 3. System tests whether h(P) = H. … X: H With salt: 1. User types userid, X, and password, P. 2. System looks up S and H, where S is the random salt for userid X and H is stored hash of S + X’s password. 3. System tests whether h(S||P) = H. Password file: … X: Ek(S), H

How Salt Increases Search Space Size Assuming that an attacker cannot find the salt associated with a userid (e.g., salt is encrypted) then the search space for a dictionary attack on a salted password is of size 2B*D, where B is the number of bits of the random salt and D is the size of the list of words for the dictionary attack. For example, if a system uses a 32-bit salt for each userid and its users pick passwords in a 500,000 word dictionary, then the search space for attacking salted passwords would be 232 * 500,000 = 2,147,483,648,000,000 Also, even if an attacker can find a salt password for a userid, he only learns one password. Since different users’ salts are different.