Chapter 3 Controlling Files. Chapter 3 Overview The file system and file access rights Executable files Computer viruses and malware Policies for file.

Slides:



Advertisements
Similar presentations
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Advertisements

CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
1 Chapter Overview Understanding and Applying NTFS Permissions Assigning NTFS Permissions and Special Permissions Solving Permissions Problems.
1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
Bilkent University Department of Computer Engineering
File Management Systems
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
Chapter 14: Protection.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
Chapter Nine Maintaining a Computer Part III: Malware.
Page 19/4/2015 CSE 30341: Operating Systems Principles Raid storage  Raid – 0: Striping  Good I/O performance if spread across disks (equivalent to n.
Operating Systems Protection & Security.
Protection.
Chapter 4 Sharing Files. Chapter 4 Overview Tailored File Sharing User Groups File Permission Flags Access Control Lists Apple OS X Access Control Lists.
Systems Security & Audit Operating Systems security.
Controlling Files Richard Newman based on Smith “Elementary Information Security”
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 AE4B33OSS Chapter 14: Protection Goals of Protection Principles of Protection Domain.
G53SEC 1 Access Control principals, objects and their operations.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
Protection Nadeem Majeed Choudhary
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Malicious Software.
1 Introduction to NTFS Permissions Assign NTFS permissions to specify Which users and groups can gain access to folders and files What they can do with.
The SELinux of First Look. Prologue After many discussions with a lot of Linux users, I’ve come to realize that most of them seem to disable SELinux rather.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Goals of Protection Operating system consists of a collection.
Computer Security: Principles and Practice
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Chapter 17: System Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 17: Protection Goals of Protection Principles.
Saurav Karmakar. Chapter 14: Protection  Goals of Protection  Principles of Protection  Domain of Protection  Access Matrix  Implementation of Access.
Introduction to NTFS Permissions
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
Instructor Materials Chapter 7 Network Security
Computer Data Security & Privacy
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
CE Operating Systems Lecture 21
Chapter 14: Protection.
Chapter 14: Protection.
OS Access Control Mauricio Sifontes.
Chapter 2: Operating-System Structures
Chapter 14: Protection.
Chapter 14: Protection.
Access Control.
Chapter 14: Protection.
Chapter 14: Protection.
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Chapter 2: Operating-System Structures
Figure 6-13: Managing Permissions
Presentation transcript:

Chapter 3 Controlling Files

Chapter 3 Overview The file system and file access rights Executable files Computer viruses and malware Policies for file protection Security controls and file permission flags Information states Security patching

The File System Modern computers keep files in a hierarchy of names – a hierarchy of “folders” or “directories” Each file has a path name –Identifies the directory entries to follow to find the file –The file name selects the right file in the final directory in the path Files are owned by a user, usually the creator –Access rights are tied to user identities –Example: Bob can read the file, but Alice can’t

Process Ownership and Access

File and Directory Ownership

File and Directory Access Rights “CRUD” – Create, Read, Update, Delete –Many systems let us control those rights –Different effects on files and directories “Update” to directory = “delete” to its files Protecting a newly-created file: two strategies –Use “Defaults” – apply the same access rights to all new files Use “Inheritance” – apply the access rights based on the enclosing directories

Executable Files Files that contain applications or other executable programs –“Binary executables” are stored in a control section and executed by the CPU –“Scripts” contain text interpreted by a programming language interpreter Execute Access Right –Helps distinguish data files from programs –Must have the “Execute” right to execute a file containing a program

Format of a Binary Executable file

Execute Access Rights

Computer Viruses A type of malware that enters computer systems. –Malware = malicious software Viruses are carried by programs –When the program executes, the virus spreads to other programs on the computer Types of virus infection –Application program infects when it is run –Boot sector virus infects when bootstrapped –USB virus infects when plugged in – virus infects if attachment is run

An Infected Application Program

Examples of Modern Malware Waledac – spreads through – creates a botnet that spreads spam and more malware. Conficker or Downadup – spread through Internet via Windows vulnerabilities – created a botnet used for spam and malware distribution. Pushdo/Cutwail – A botnet and spam package that used to produce 7 million messages a day. ZeuS – creates botnet focused on financial fraud Stuxnet – attacks control logic in industrial plants; probable target was Iranian nuclear sites

Sharing and Protecting Files Objectives for sharing files –Provide computing for authorized users –Preserve the Chain of Control –Permit/prevent general sharing among users Risks – a generic set 1.Denial of service 2.Subversion 3.Masquerade 4.Disclosure 5.Forgery

Policy Alternatives Global Policies – applied to all users by default –Isolation Policy – keep users separate –Sharing Policy – let users share their files Tailored Policies –Modify rights for specific sets of files –Specific tailorings Privacy – block some files from sharing Shared reading – share some blocked files Shared updating – full rights for some users

Underlying Policy on Shared System Our policy must make it possible for users to share application programs. –Three policy statements below allow this while defending against related risks.

Executable Access Rights

A Global Isolation Policy By default, all personal files are kept private Specific shared files are available –Addressed by the first 3 policy statements Global policy requires one added rule: #Policy StatementRisks 4Files belonging to one user shall be protected from any access (read or write) by other users 1, 2, 5

Isolation Policy

Bob’s Policy Bob perceives another risk: –6. Unauthorized access to client data To address this, he adds this requirement:

A Global Sharing Policy By default, all personal files are shared –Readable by others but not writeable Application files are also shared –Addressed by the first 3 policy statements Global policy requires two statements –Replaces #4 in the global isolation policy #Policy StatementRisks 4Files belonging to one user shall be readable by others1 5Files belonging to one user shall be protected from writing by others. 1, 3, 5

Security Controls An operating system can protect files as long as: 1.The OS protections are always applied when we access our files, and 2.There is no way to bypass the OS protections Basic Principle: Deny by Default –We always start by granting no access –We add access rights –This makes it easier to assign the right permissions and achieve Least Privilege

Managing Access Rights Access Matrix contains two dimensions –A full matrix is too large for practical use –We can organize access rights by clustering in one dimension or the other Cluster by Column = Capability-Based Security –We associate rights with users, processes, or other active entities –A key-ring is a set of capabilities: ownership grants access to the locked items –Tickets provide capabilities

Cluster by Row = File Permissions Currently the most popular strategy in OSes –Access rights are associated with resources like files, devices, storage areas, etc. –The list of rights tells which users/processes have which access rights. Implementations Today –File Permission Flags – Unix –Access Control Lists – Windows, OS X –Detailed examples – Next Chapter

Permission Flags in General Sets of flags to specify access rights. Example: –RWX = Read, Write, Execute access rights A set of flags for each type of process –Processes belonging to the file’s owner –Processes belonging to the system –Processes belonging to others – the world Still too redundant: owner and system often have full access to the files anyway Compact access rules specify world rights only.

Compact access rules for Bob’s Files A simple way to list file security controls to enforce basic or global security policies –Specify the files, their owners, and the access rights for the other users on the system. –These are “Logical” controls

States and State Diagrams A technique to illustrate a system’s behavior –Each state is a separate situation –Arrows between states show transitions A transition indicates both cause and effect An event causes the transition An action may take place at the transition A door may be Open or Closed – two states The events Opening or Closing cause the transition between the states

Information States Data or information may be in these basic states –Storage state Stored in a computer, not being processed “Data at rest” –Processing state Being used by an active process Usually stored in RAM –Transmission state Being moved from one place to another “Data in motion”

Example: Bob’s Essay

The Security Patch Race A race begins when a security problem arises –The software developer races to develop a fix to eliminate the problem –Attackers race to write software that exploits the problem and lets them attack computers Attack software is called an exploit Any computer that doesn’t patch the problem may be vulnerable to the exploit Window of vulnerability = time during which an exploit exists but computers aren’t patched

Patching Security Flaws The Patching Process 1.Collect error reports 2.Prioritize errors and assign to engineers 3.Engineer develops software to fix the error 4.Software fixes are chosen for a patch 5.The patch is tested 6.The patch is released This applies to all flaws including security flaws –Security fixes may have higher priority

The risk of delayed patching 9am – 10am – 11am – 12pm – 1pm – 2pm – 3pm… (Accelerated time frame)

A State Model of Patching