Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Lecture 1: Overview modified from slides of Lawrie Brown.
Chapter 14 Computer Security Threats
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Security+ Guide to Network Security Fundamentals
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Requirements
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
CPE 5002 Network security. Look at the surroundings before you leap.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Security Chapter 15. Computer and Network Security Requirements Confidentiality –Requires information in a computer system only be accessible for reading.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Operating Systems Protection & Security.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
Chapter 18 Intruders.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Protection & Security Introduction to Operating Systems: Module 16.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Network security Network security. Look at the surroundings before you leap.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Security CS Introduction to Operating Systems.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 5: Basic Security.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Information Security in Distributed Systems Distributed Systems1.
Chap1: Is there a Security Problem in Computing?.
Malicious Software.
Chapter 9 Intruders.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
1 Security Chapter Information Assurance and Security Confidentiality  Not available or visible to unauthorized parties Integrity  Only modifiable.
Threats, Attacks And Assets… By: Rachael L. Fernandes Roll no:
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
Chapter 9 Intruders.
Securing Network Servers
Computer Data Security & Privacy
12: Security The Security Problem Authentication Program Threats
Chapter 9 Intruders.
Security.
Security network management
Protection and Security
Operating System Concepts
Operating System Concepts
Security Attacks Network Security.
Presentation transcript:

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 162 Security Requirements Confidentiality Integrity Availability Authenticity

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 163 Scope of System Security

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 164 Types of Threats Interruption  An asset of the system is destroyed of becomes unavailable or unusable  Attack on availability  Examples:  Destruction of hardware  Cutting of a communication line  Disabling the file management system

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 165 Types of Threats Interception  An unauthorized party (person, program, or computer) gains access to an asset  Attack on confidentiality  Examples:  Wiretapping to capture data in a network  Illicit copying of files or programs

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 166 Types of Threats Modification  An unauthorized party not only gains access but tampers with an asset  Attack on integrity  Examples:  Changing values in a data file  Altering a program so that it performs differently  Modifying the content of messages being transmitted in a network

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 167 Types of Threats Fabrication  An unauthorized party inserts counterfeit objects into the system  Attack on authenticity  Examples:  Insertion of spurious messages in a network  Addition of records to a file

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 168 Computer System Assets Hardware  Threats include accidental and deliberate damage Software  Threats include deletion, alteration, damage  Backups of the most recent versions can maintain high availability

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 169 Computer System Assets Data  Involves files  Security concerns availability, secrecy, and integrity  Statistical analysis of data files can lead to determination of individual information which threatens privacy

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1610 Computer System Assets Communication Lines and Networks  Passive Attacks  Learn or make use of information from the system but does not affect system resources  Examples: Release of message contents – a telephone conversation, an electronic mail message, and a transferred file are all subject to these threats Traffic analysis – Encryption masks the contents of what is transferred so even if obtained by someone, they would be unable to extract information; however the pattern of communication could be observed

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1611 Computer System Assets Communication Lines and Networks  Active Attacks  Involve some modification of the data stream or the creation of a false stream  Four categories: Masquerade Replay Modification of messages Denial of service

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1612 Protection No protection  Sensitive procedures are run at separate times Isolation  Each process operates separately from other processes with no sharing or communication  Each process has its own address space and files

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1613 Protection Share all or share nothing  Owner of an object (e.g. a file) declares it public or private Share via access limitation  Operating system checks the permissibility of each access by a specific user to a specific object  Operating system acts as the guard

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1614 Protection Share via dynamic capabilities  Dynamic creation of sharing rights for objects Limit use of an object  Limit not just access to an object but also the use to which that object may be put  Example: a user may be able to derive statistical summaries but not to determine specific data values

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1615 Protection of Memory Essential in a multiprogramming environment Need to insure the correct functioning of the various processes that are active Easily accomplished with a virtual memory scheme

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1616 User-Oriented Access Control Referred to as authentication Log on  Requires both a user identifier (ID) and a password  System only allows users to log on if the ID is known to the system and password associated with the ID is correct  Users can reveal their password to others either intentionally or accidentally  Hackers are skillful at guessing passwords  ID/password file can be obtained

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1617 Data-Oriented Access Control Associated with each user, there can be a profile that specifies permissible operations and file accesses Operating system enforces these rules Database management system controls access to specific records or portions of records

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1618 Access Matrix Subject  An entity capable of accessing objects Object  Anything to which access is controlled Access rights  The way in which an object is accessed by a subject

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1619 Access Matrix

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1620 Access Control List Access matrix decomposed by columns For each object, an access control list gives users and their permitted access rights

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1621 Capability Tickets Access matrix decomposed by rows Specifies authorized objects and operations for a user

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1622 Intrusion Techniques Objective of intruder is the gain access to the system or to increase the range of privileges accessible on a system Protected information that an intruder acquires is a password

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1623 Techniques for Learning Passwords Try default password used with standard accounts shipped with system Exhaustively try all short passwords Try words in dictionary or a list of likely passwords Collect information about users and use these items as passwords

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1624 Techniques for Learning Passwords Try users’ phone numbers, social security or person numbers, and room numbers Try all legitimate license plate numbers for location where the person is living Use a Trojan horse to bypass restrictions on access Tap the line between a remote user and the host system

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1625 ID Provides Security Determines whether the user is authorized to gain access to a system Determines the privileges accorded to the user  Superuser enables file access protected by the operating system  Guest or anonymous accounts have more limited privileges than others ID is used for discretionary access control  A user may grant permission to files to others by ID

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1626 UNIX Password Scheme

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1627 Password Selection Strategies Computer generated passwords  Users have difficulty remembering them  Need to write it down  Have history of poor acceptance

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1628 Password Selection Strategies Reactive password checking strategy  System periodically runs its own password cracker to find guessable passwords  System cancels passwords that are guessed and notifies user  Consumes resources to do this  Hacker can use this on their own machine with a copy of the password file

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1629 Password Selection Strategies Proactive password checker  The system checks at the time of selection if the password is allowable  With guidance from the system users can select memorable passwords that are difficult to guess

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1630 Intrusion Detection Assume the behavior of the intruder differs from the legitimate user in ways that can be quantified Statistical anomaly detection  Collect data related to the behavior of legitimate users over a period of time  Statistical tests are used to determine if the behavior is not legitimate behavior

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1631 Intrusion Detection Rule-based detection  Rules are developed to detect deviation from previous usage pattern  Expert system searches for suspicious behavior

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1632 Intrusion Detection Audit record  Fundamental tool for intrusion detection  Native audit records  All operating systems include accounting software that collects information on user activity  Detection-specific audit records  Collection facility can be implemented that generates audit records containing only that information required by the intrusion detection system

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1633 Malicious Programs Those that need a host program  Fragments of programs that cannot exist independently of some application program, utility, or system program Independent  Self-contained programs that can be scheduled and run by the operating system

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1634 Taxonomy of Malicious Programs

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1635 Trap Door Entry point into a program that allows someone who is aware of the trap door to gain access Used by programmers to debug and test programs  Avoids necessary setup and authentication  Method to activate program if something wrong with authentication procedure

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1636 Logic Bomb Code embedded in a legitimate program that is set to “explode” when certain conditions are met  Presence or absence of certain files  Particular day of the week  Particular user running application

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1637 Trojan Horse Useful program that contains hidden code that when invoked performs some unwanted or harmful function Can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly  User may set file permission so everyone has access

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1638 Virus Program that can “infect” other programs by modifying them  Modification includes a copy of the virus program  The infected program can infect other programs

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1639 Worms Use network connections to spread form system to system Electronic mail facility  A worm mails a copy of itself to other systems Remote execution capability  A worm executes a copy of itself on another system Remote log-in capability  A worm logs on to a remote system as a user and then uses commands to copy itself from one system to the other

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1640 Zombie Program that secretly takes over another Internet-attached computer It uses that computer to launch attacks that are difficult to trace to the zombie’s creator

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1641 Trusted Systems Multilevel security  Information organized into levels  No read up  Only read objects of a less or equal security level  No write down  Only write objects of greater or equal security level

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1642 Reference Monitor

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1643 Trojan Horse Defense

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1644 Trojan Horse Defense

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1645 Trojan Horse Defense

Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 1646 Trojan Horse Defense