20103112 SUK KI KIM New architecture for enhanced security system in linux.

Slides:



Advertisements
Similar presentations
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Advertisements

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
A Basic UNIX System By Sandy G. Introduction One of the most common operating systems in existence is Unix. Unix exists in many different flavors, from.
Linux File & Folder permissions. File Permissions In Ubuntu, files and folders can be set up so that only specific users can view, modify, or run them.
XSS: Cross Site Scripting Alan Geleynse. Example
Security Systems Theory UG2 Module Introduction Themes 1. Top down design of security systems – security technologies as 'black boxes'. 2. Internal design.
CIS 240 Introduction to UNIX Instructor: Sue Sampson.
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
UNIX By Darcy Tatlock. 1. Successful Log Into Unix To actively manipulate your website you need to be logged in. Without being logged in you cannot enter.
Linux File Security. What is Permission ? Specifies what right are granting to users to access the resources available in the computer. So that important.
X2O Server Installation
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
Introduction to the Mathematica Text Interface for Unix/Linux Kernel Part 1 MCSR Math Camp.
CNIT 132 Intermediate HTML and CSS Publish Web Page.
CPSC203 Introduction to Computers Lab 69 By Jie Gao.
Command Line Unix for Information Professionals In web administration or information management work, I may be called upon, as an Information Professional,
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
IT2204: Systems Administration I 1 6b). Introduction to Linux.
CPSC203 Introduction to Computers Lab 33 By Jie Gao.
E-Michigan Web Development 1. 2 What Is It? A web based collaboration tool that is internal to state government and accessible only from within the state.
Operating System What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware. An operating.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
At the Log in page enter your college provided username and password then click submit to login to Owl Link.
Aug Introduction CMSC 104 section 301 Problem Solving and Computer Programming Fall 05.
Chapter 10: Rights, User, and Group Administration.
Log-in to the Unix Server A successful log-in allows access to the server through the Secure Shell. SSH, also known as Secure Shocket Shell, is a Unix.
Tera Term Brian Smith Chris Vasse Zaheemat Adetoro William Newton Tom Presgraves.
Guide to MCSE , Enhanced1 Activity 1-1: Determining the Windows Server 2003 Edition Installed on a Server Objective is to determine the edition of.
B2B FileMover Grand Valley State University. B2B FileMover Agenda Introduction & Background File Exchange Process Security Infrastructure Design Reporting.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
CSI3131 – Lab 1 Observing Process Behaviour. Running Linux under Virtual PC  Start Virtual PC  This Windows program provides a virtual machine to run.
Assumptions of Secure Operation University of Sunderland CIT304 Harry R. Erwin, PhD.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Here is the log in for your control panel. Enter your user name, password and click Login.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Isecur1ty training center Presented by : Eng. Mohammad Khreesha.
Basic Unix Commands & GCC Saurav Karmakar Spring 2007.
Linux A practical introduction. 1)Background and Getting Started Linux is an operating system with multiple providers Red Hat/CentOS (our version) Ubuntu.
 Last lesson, the Windows Operating System was discussed along with the Windows command shell  Unix is a computer operating system, that similarly manages.
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July 2012.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Installing Coldfusion Under Linux Mid-Michigan Coldfusion User’s Group, Nov
MindMajix IBM AIX TrainingIBM AIX Training. Introduction to IBM AIX IBM AIX IBM Advanced Interactive executive is an open-standards-based UNIX OS designed.
Introducing, Installing, and Upgrading Windows 7
Chapter 6 – Users, Groups, and Permissions
Using iLocker.
Are You and Your Students Responsible Digital Citizens?
User Access and User ID Commands in UNIX
Useful Linux Commands.
Lab 1 introduction, debrief
Unable to set your Webroot account password While logging in to the account, if any message Can't log in? appear on your screen. Then, Click on the link.
Unable to set your Webroot account password While logging in to the account, if any message Can't log in? appear on your screen. Then, Click on the link.
The Linux Command Line Chapter 2
Penetration Testing Computer Science and Software Engineering
Social Media Safety Freshman Seminar.
COP 4343 Unix System Administration
Figure 6-9: Managing Users and Groups
Security and File Permission
OPS235 Lab4: Investigations 5 – 9
The Linux Command Line Chapter 9
Chapter 28: User Security
Security Control.
Information Architecture in OU Campus
Calculating Effective Permissions Manually
Active Directory Security Assessment Results
Calculating Effective Permissions Manually
CS703 - Advanced Operating Systems
Presentation transcript:

SUK KI KIM New architecture for enhanced security system in linux

Contents 1. Introduction 2. Basic Idea 3. New architecture 4. Demo

Introduction Current Linux system has two security methods Password security When we log into the system. File permission Access rights to specific users and group users. The read permission The write permission The execute permission

Introduction Raised question Are really trusted root user? If hacker get root account? If hacker get my account? Is there any method to protect my own data from hacker? I want to share my account with my friend. But I don’t want to share my own data. Is there any method to support this? I suggest a new architecture to solve the raised question.

Basic Idea Assume that directory ABCD has password which is abcdefg CD ABCD Enter Password : abcd Password is wrong. You are not allowed to enter. CD ABCD Enter Password : abcdefg

Basic Idea

New architecture

Demo

Q&A