CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Network Security.
Slide 14-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 5 14 Protection and Security.
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Security & Encryption Thomas Fenske & Joseph Minter.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Operating Systems Protection & Security.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
Systems Security & Audit Operating Systems security.
Lecture 18 Page 1 CS 111 Online Access Control Security could be easy – If we didn’t want anyone to get access to anything The trick is giving access to.
CIS 450 – Network Security Chapter 8 – Password Security.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Types of Electronic Infection
Module 9: Fundamentals of Securing Network Communication.
Operating System Security Fundamentals Dr. Gabriel.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
TCP/IP (Transmission Control Protocol / Internet Protocol)
Network Security & Accounting
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Wireless and Mobile Security
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
science/internet-intro
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Policies and Security for Internet Access
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Chapter 14: System Protection
Secure Sockets Layer (SSL)
Module 8: Securing Network Traffic by Using IPSec and Certificates
Tutorial on Creating Certificates SSH Kerberos
Welcome To : Group 1 VC Presentation
CE Operating Systems Lecture 21
Chapter 14: Protection.
Security.
Chapter 14: Protection.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th

Units of Protection  Memory  I/O devices  Programs  Data

Levels of Protection  None  Isolation –No sharing of processes or resources  Share all or nothing –Public or private  Limit access : permissions  Limit users  Dynamic sharing

Protection Schemes  Control access to entities  Decryption –Protects data and memory  Access tokens –Protects devices and network nodes  General techniques –Authentication –Authorization

Authentication  Verifying that user is truly user  Types: –Physical : Check IP address of machine –User : User id and password –Process : Thread is associated with proper user process

Physical Authentication  Checks IP address of machine  How secure? –Same technique used by web sites –IP addresses can be changed  Requires knowledge  Change too much, won’t match protocol details

User Authentication  Key is password  How secure? –Password must be complex enough  Easy to guess if all lowercase  Mix of letters, digits, and special characters –Store encrypted  Hacker could read text file  Encryption code stored separately

Process Authentication  Most secure  Uses process status register –Changed with each context switch –Hacker program would cause context switch  Best hacker could do would be to deactivate this scheme

Firewalls  Protects  Allows mail only from trusted sources  Separates attachments to isolated areas

Web Traffic Security  Secure Sockets Layer –Included in https secure protocol  Authentication server –Uses credentials of user to create unique ticket and session key –Ticket encrypted using session key  Secure cookie encryption –Return to previous web site –Prevents reroutes

Software Authentication  Verify that software is authentic and can be trusted  Trusted source for downloaded software  Digital signature to ensure unaltered

Authorization schemes   Limit access to only approved users, processes, or procedures   Schemes: – –Permissions : mostly associated with users or groups – –Memory keys : protects data areas

Permissions  UNIX has simple file protection mask  Windows uses permission groups  These protect files and directories

Permission Policy Commands  Transfer  Grant  Delete  Copy access  Give access level  Remove access

Memory Keys  Used to protect specific data areas  Memory key is binary bit pattern attached to data location  Only process with same memory key can access

Security Access Matrix  Most operating systems combine security techniques  Combination is called “access matrix”  Trick is finding most security with least cost and least impact to efficiency

Ring Architecture  Concentric domains where innermost is most secure and outer is least  Files are placed in appropriate ring  Access to an inner ring is granted only through a monitored entry point –Entry requires appropriate authorization –Only one entry at a time; prevents piggybacking

Collapsed Access Matrix  Collection of access control data  Access Control List is column-based –List of all entities’ access to particular protected object  Capacity is row-based –List of all permissions of a particular entity

Encryption  Convert clear data to ciphered data and back again  Encrypt() and decrypt()  Types: –Private key : share encryption between trusted sources –Public key : support multiple interaction types

Private Key Encryption  Symmetric : same key used to encrypt and decrypt  Data Encryption Standard –Complex series of substitutions and permutations on smaller blocks –Pattern changes daily

Public Key Encryption  Two-part data encryption –Uses a public one that is available to anyone wishing to interact with data location –Data encrypted with private one –Decrypt function sent to requestor if passes authorization