Sharing Files Richard Newman based on Smith “Elementary Information Security”

Slides:



Advertisements
Similar presentations
1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
Advertisements

Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
1 CSE 390a Lecture 4 Persistent shell settings; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller
File Security. Viewing Permissions ls –l Permission Values.
User Accounts and Permissions Chapter IV / Part II.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
G Robert Grimm New York University Protection and the Control of Information Sharing in Multics.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
Linux File Security. What is Permission ? Specifies what right are granting to users to access the resources available in the computer. So that important.
LERSAIS.  Access Control in Unix  Access Control in Windows  Port Redirection 2.
Group Accounts; Securing Resources with Permissions
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
File System Security 1. General Principles Files and folders are managed by the operating system Applications, including shells, access files through.
Guide to Operating System Security Chapter 5 File, Directory, and Shared Resource Security.
Chapter 3.3: Filesystem Security 1. General Definitions Files and folders (directories) are managed by the operating system Applications, including shells,
Operating System Security CS460 Cyber Security Spring 2010.
Chapter 4 Sharing Files. Chapter 4 Overview Tailored File Sharing User Groups File Permission Flags Access Control Lists Apple OS X Access Control Lists.
7.3. Windows Security Descriptors
Controlling Files Richard Newman based on Smith “Elementary Information Security”
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Linux+ Guide to Linux Certification, Second Edition
Module 4 Managing Access to Resources in Active Directory ® Domain Services.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
File Permission and Access. Module 6 File Permission and Access ♦ Introduction Linux is a multi-user system where users can assign different access permission.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Access Control.
G53SEC 1 Access Control principals, objects and their operations.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Chapter 10: Rights, User, and Group Administration.
UNIX System Protection. Unix History Developed by Dennis Ritchie and Ken Thompson at AT&T Bell Labs Adapted some ideas from the Multics project in 1969.
Page 1 NTFS and Share Permissions Lecture 6 Hassan Shuja 10/26/2004.
Linux+ Guide to Linux Certification, Third Edition
Linux+ Guide to Linux Certification, Third Edition
Multics CysecLab Graduate School of Information Security KAIST.
Access Control  privilege How does your code manage who has access to what?  authorization  permission Two OS models: Unix Windows.
MA194Using WindowsNT1 Topics for the day… WindowsNT Security WindowsNT File System (NTFS) Viewing/Setting Document and Folder Permissions Access Control.
1 Introduction to NTFS Permissions Assign NTFS permissions to specify Which users and groups can gain access to folders and files What they can do with.
Chapter 4 Sharing Files. FIGURE 4.0.F01: Sharing files for reading on Microsoft Windows 8.1. Used with permission from Microsoft.
CSCI 530 Lab Authorization. Review Authentication: proving the identity of someone Passwords Smart Cards DNA, fingerprint, retina, etc. Authorization:
Access Control Lesson Introduction ●Understand the importance of access control ●Explore ways in which access control can be implemented ●Understand how.
CSCI 330 The UNIX System Unit V Permissions. all access to directories and files is controlled UNIX uses discretionary access control (DAC) model each.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
File System Security ls -l. First Columm d = directory l = symbolic link b = block special file c = character special file p = fifo (or named pipe) special.
Configuring and Managing Resource Access Lecture 5.
4P13 Week 5 Talking Points 1. Security Provided by BSD a self-protecting Trusted Computing Base (TCB) spanning kernel and userspace; kernel isolation.
Access Control. Many models Traditional Unix model Windows model Role-based access control (SE Linux)‏ Access control for confidentiality (Bell-La Padula.
Karlstad University Operating System security Ge Zhang Karlstad University.
Company LOGO Security in Linux PhiHDN - VuongNQ. Contents Introduction 1 Fundamental Concepts 2 Security System Calls in Linux 3 Implementation of Security.
Privileges: who can control what
CIT 480: Securing Computer Systems
Introduction to NTFS Permissions
Protection and Security
Systems Administration CSCI Fall 2016
CE Operating Systems Lecture 21
Presented by, Mr. Satish Pise
UNIX System Protection
Security and File Permission
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
Persistent shell settings; users/groups; permissions
Figure 6-13: Managing Permissions
Access Control and Audit
Presentation transcript:

Sharing Files Richard Newman based on Smith “Elementary Information Security”

File Sharing Policies Generic – Isolation – Share everything Tailored – Privacy – Shared Reading – Shared Updating

Tailored File Sharing Policy Considerations Which objects are involved – By owner – By project – By type Which users are granted new rights – Individual – Group – Role – Role relative to X Default access – Deny or allow? What access rights to enforce – R, W, X,... – Conditions?

File Sharing on Windows Default: Isolation Per folder file sharing – Chose people to share with – Permission level Permission levels – Owner – full access, owns folder – Co-owner – full access, doesn't own folder – Contributor (not in Windows 7) – create files, modify own files – Reader – read files in folder

User Groups Unix, “professional” Windows Implementation of group access – File has group owner attribute, and group access rights – Group named on ACL with access rights Implementation of groups – Special file – edited – System file accessed through utilities – Built-in groups Administrators, wheel group, per-user group – Associate user ID with group upon login Allows more precise audit

Least Privilege Administrator access – Log in as admin – Log in as user with admin rights (in group) – Log in as regular user, but ability to authenticate as admin for specific programs, actiions (sudo, etc.) – Switch mode as needed (setuid) – UAC – User Account Control - “permission to continue”

Posix File Permissions Three classes of entity relative to a file – User (Owner) – one uid per file – Group – one gid per file – Other (World) – Of course, there is always root.... Access permission bits – rwx – r – read file or directory listing – w – write/modify file or create/rename/delete files in directory – x – execute file or use directory in path Changing permissions – chmod – chown – chgrp

Rights Ambiguity Conflicting rights bits – e.g, group allowed to write but user not allowed to write – e.g. other allowed to read but group not allowed to read – Any user attempting access belongs to “all” and zero, one, or two other categories How are conflicting rights bits treated – OpenVMS - “OR” bits of all applicable classes – Unix – use bits of most specific applicable class – explicit denial Root User Group Other

Access Control Lists (ACLs) Need for ACLs – Policy with read access for group A, read/write access for group B – Can't do it in Unix rwx bits Multics – Pioneered ACLs – Subject matched to a.b.c with wildcards – a is user name, b is project name, c is compartment – rew rights Modern systems – Posix.1e – Apple Macintosh OS-X – MS Windows – NFSv4

Posix.1e ACLs Classes – User – user::rwx – Group – group::rwx – World – other::rwx – Specific user – user:user-name:rwx – Specific group – group:group-name:rwx – Mask applied to specific users/groups – mask::rwx

Windows/Mac ACLs Per file/directory – Owner rights – Everyone rights – Specific user rights – Selection of no access/read only/read-write Special considerations: Must have admin rights on Mac

Apple OS/X ACLs Entities – Owner – Everyone – Specific individuals – Groups Access rights – No access – Read-only – Read-write – “OR” of rights apply to requester Groups – Created under “System Preferences -> User Accounts” – Requires admin access

Windows ACLs Entities – Owner – Everyone – Specific individuals – Groups Access rights – “Full Control” – Modify – Read & Execute – Read – Write – Special Permissions – Allow and deny flags – Apply deny first, then check for allow