1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

Slides:



Advertisements
Similar presentations
©2006 Microsoft Corporation. All rights reserved. Windows Vista Security Tidbits Steve Riley Senior Security Strategist Microsoft Corporation
Advertisements

Chapter 15 Security and Protection Copyright © 2008.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
CSE 513 Introduction to Operating Systems Class 10 - Security Jonathan Walpole Dept. of Comp. Sci. and Eng. Oregon Health and Science University.
Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Security. 2 Security in the real world Security decisions based on: –Value, Locks, Police Some observations: –Not all locks are the same –People pay for.
1 Pertemuan 23 Sistem Keamanan Matakuliah: T0316/sistem Operasi Tahun: 2005 Versi/Revisi: 5.
Avishai Wool lecture Introduction to Systems Programming Lecture 13 Security.
Security Awareness: Applying Practical Security in Your World
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
6/28/20151 Bringing Semantic Security to Semantic Web Services B. Ramamurthy.
Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.
Chapter 9 Security Environment Basics of Cryptography Protection Mechanisms Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
BR1 Protection and Security B. Ramamurthy Chapters 18 and 19.
Understanding Security Lesson 6. Objective Domain Matrix Skills/ConceptsMTA Exam Objectives Understanding the System.Security Namespace Understand the.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Windows Security Mechanisms Al Bento - University of Baltimore.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Operating Systems Protection & Security.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
CIS 450 – Network Security Chapter 8 – Password Security.
Security 0 The Secure Environment. Security 1 The Secure Environment Security goals (C.I.A.) and threats.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Cryptography Data communications and networks Momina Tariq: Ambreen Sohail: Data Communications and Networks.
Operating Systems 1 K. Salah Module 6.0: Security and Protection  Types of misuse: –1. Accidental –2. Intentional –Protection is to prevent either accidental.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
1 Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
Security. cs431-cotter2 Figure 9-1. Security goals and threats. Threats Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall, Inc. All rights.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Security Chapter 9 Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Outline Objective: –Access Control Mechanisms. The Security Environment Threats Security goals and threats.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Network Security & Accounting
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Understanding Security
Information Systems Design and Development Security Precautions Computing Science.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Chapter 9 Security 9.1 The security environment
Chapters 14,15 Security.
Fundamental Concepts in Security and its Application Cloud Computing
Chapter 9 Security 9.1 The security environment
Security and File Permission
Enabling Technology1: Cryptography
Security.
Chapters 14,15 Security.
Protection and Security
Computer Security Authentication
Operating System Concepts
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

1 Security and Protection Chapter 9

2 The Security Environment Threats Security goals and threats

3 Basics of Cryptography Relationship between the plaintext and the ciphertext

4 Monoalphabetic substitution –each letter replaced by different letter Given the encryption key, –easy to find decryption key Secret-key crypto called symmetric-key crypto Secret-Key Cryptography

5 Public-Key Cryptography All users pick a public key/private key pair –publish the public key –private key not published Public key is the encryption key –private key is the decryption key

6 Digital Signatures Computing a signature block What the receiver gets (b)

7 Authentication Using Passwords The use of salt to defeat precomputation of encrypted passwords Salt Password,,,,

8 Authentication Using a Physical Object Magnetic cards –magnetic stripe cards –chip cards: stored value cards, smart cards

9 Authentication Using Biometrics A device for measuring finger length.

10 Countermeasures Limiting times when someone can log in Automatic callback at number prespecified Limited number of login tries A database of all logins Simple login name/password as a trap –security personnel notified when attacker bites

11 Mobile Code Sandboxing Applets can be interpreted by a Web browser

12 Protection Mechanisms Protection Domains (1) Examples of three protection domains

13 Protection Domains (2) A protection matrix

14 Protection Domains (3) A protection matrix with domains as objects

15 Access Control Lists (1) Use of access control lists of manage file access

16 Access Control Lists (2) Two access control lists

17 Capabilities (1) Each process has a capability list

18 Cryptographically-protected capability Generic Rights 1.Copy capability 2.Copy object 3.Remove capability 4.Destroy object Capabilities (2) ServerObjectRightsf(Objects, Rights, Check)

19 Windows NT(W2K) Security Access Control Scheme –name/password –access token associated with each process object indicating privileges associated with a user –security descriptor access control list used to compare with access control list for object

20 Access Token (per user/subject) Security ID (SID) Group SIDs Privileges Default Owner Default ACL

21 Security Descriptor (per Object) Flags Owner System Access Control List (SACL) Discretionary Access Control List (DACL)

22 Access Control List ACL Header ACE Header Access Mask SID ACE Header Access Mask SID......

23 Access Mask Generic All Generic Execute Generic Write Generic Read Access System Security Maximum allowed Delete Read Control Write DAC Write Owner Synchronize Generic Access Types Standard Access Types Specific Access Types

24 Access Control Using ACLs When a process attempts to access an object, the object manager in W2K executive reads the SID and group SIDs from the access token and scans down the object’s DACL.W2K If a match is found in SID, then the corresponding ACE Access Mask provides the access rights available to the process.