Systems Security & Audit Operating Systems security.

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

Chapter 6 User Protections in OS. csci5233 computer security & integrity (Chap. 6) 2 Outline User-level protections 1.Memory protection 2.Control of access.
CSC 405 Introduction to Computer Security
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
Operating System Support Focus on Architecture
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
1 Process Description and Control Chapter 3. 2 Process Management—Fundamental task of an OS The OS is responsible for: Allocation of resources to processes.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CSCE 351: Operating System Kernels
CMPT 300: Final Review Chapters 8 – Memory Management: Ch. 8, 9 Address spaces Logical (virtual): generated by the CPU Physical: seen by the memory.
Common System Components
1 CSE 380 Computer Operating Systems Instructor: Insup Lee and Dianna Xu University of Pennsylvania Fall 2003 Lecture Note: Protection Mechanisms.
Computer Organization and Architecture
Chapter 12 File Management Systems
SE571 Security in Computing
Using Two Queues. Using Multiple Queues Suspended Processes Processor is faster than I/O so all processes could be waiting for I/O Processor is faster.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3 Operating System Organization.
Copyright Arshi Khan1 System Programming Instructor Arshi Khan.
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
Chapter 51 Threads Chapter 5. 2 Process Characteristics  Concept of Process has two facets.  A Process is: A Unit of resource ownership:  a virtual.
Chapter 3 Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 11 Case Study 2: Windows Vista Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
Ajmer Singh PGT(IP) Software Concepts. Ajmer Singh PGT(IP) Operating System It is a program which acts as an interface between a user and hardware.
Dr Damitha Karunaratna University of Colombo school of computing
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 2: System Structures.
Protection and the Kernel: Mode, Space, and Context.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
OS provide a user-friendly environment and manage resources of the computer system. Operating systems manage: –Processes –Memory –Storage –I/O subsystem.
Composition and Evolution of Operating Systems Introduction to Operating Systems: Module 2.
Chapter 4 Storage Management (Memory Management).
Hardware process When the computer is powered up, it begins to execute fetch-execute cycle for the program that is stored in memory at the boot strap entry.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
G53SEC 1 Access Control principals, objects and their operations.
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
Security in Operating Systems Cuiwei Zhao. Security in Operating System §Security breaches §Security goals §Protected objects of the general purpose operating.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
Processes and Process Control 1. Processes and Process Control 2. Definitions of a Process 3. Systems state vs. Process State 4. A 2 State Process Model.
Multics CysecLab Graduate School of Information Security KAIST.
UNIX Unit 1- Architecture of Unix - By Pratima.
Operating Systems Security
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 19 October 26, 2004.
Concepts and Structures. Main difficulties with OS design synchronization ensure a program waiting for an I/O device receives the signal mutual exclusion.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Operating System Structure Lecture: - Operating System Concepts Lecturer: - Pooja Sharma Computer Science Department, Punjabi University, Patiala.
1.3 Operating system services An operating system provide services to programs and to the users of the program. It provides an environment for the execution.
Computer Security: Chapter 5 Operating Systems Security.
Chapter 2 Operating System Overview Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
1.1 Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 1: Introduction What Operating Systems Do √ Computer-System Organization.
Introduction to Operating Systems Concepts
Chapter 8: Main Memory.
William Stallings Computer Organization and Architecture
Operating System Structure
What is an Operating System?
Windows Internals Brown-Bag Seminar Chapter 1 – Concepts and Tools
CGS 3763 Operating Systems Concepts Spring 2013
Outline Module 1 and 2 dealt with processes, scheduling and synchronization Next two modules will deal with memory and storage Processes require data to.
Process Description and Control
Lecture Topics: 11/1 General Operating System Concepts Processes
Chapter 2: Operating-System Structures
Introduction to Operating Systems
Operating Systems: A Modern Perspective, Chapter 3
Chapter 2: Operating-System Structures
Access Control and Audit
Presentation transcript:

Systems Security & Audit Operating Systems security

Contents Review on objective of operating system Things to protect and protection methods Trusted Operating System Protection of memory Protection of other objects

Function of Operation System Control the use of resources of the computer CPU time Memory I/O File storage

CPU time Fair use No hogging by single process (multi- processing) Managed by a scheduler

Memory Assign sufficient memory to run the program Return memory to OS after use Managed by programmer and later the memory manager (part of OS)

Objects that are protected Memory Sharable I/O devices, e.g. disks Serially reusable I/O devices, e.g. printers Sharable programs and procedures Sharable data

Process A program in execution Requires CPU time and memory (address space) to run Address space contains program code, program’s data, and stack System calls are required to run the program

Memory protection Fence Relocation Base/Bounds Register Tagged architecture Segmentation Paging

Segregation of memory: Fence Memory System Memory User memory

Example: DOS Memory System Memory User memory FFFFF AFFFF Interrupt Vectors

COM files have fixed starting address Memory COM file 1 I normally start here COM file 2 I am OK. This is my starting point

COM files have fixed starting address Memory COM file 3 COM file 2 Oops! I cannot run

EXE files are RELOCATABLE Memory COM file 3 EXE file 1 I can start anywhere

Base and Bound Register User Memory Application 1 Base Address Bound Address I cannot go over this address Application 2 I am safe here

Data Tagged architecture Tag Machine Word I have the data address I know who can access this address

Segmentation Memory Segment 1 Segment 2 Segment 3 We have Different Segment no. Our address Start from zero The CPU has A no. of segment registers

Segment of a process Text (code) Stack Data Room for growth Memory assigned

Paging We are fixed size We are virtual memory

Paging Technique used in virtual memory system to give a linear addressing space Pages are of fixed size The actual storage location may be in physical memory or in the hard disk MMU maps virtual memory to physical memory using page tables

Paging Can run program that is too big to fit into the physical memory Make programming easier as memory is assigned by MMU The programmer (instructions he wrote) cannot access the physical memory directly So MORE SAFE

Operation System Layered system Instructions have different privilege Operating system structured in layers More structure means better management and better protection, but less efficient

Layer system Layer 0: Processor allocation Layer 1: Memory management Layer 2: Process communication Layer 3: Input/output management Layer 4: User programs

Ring system: Pentium Ring O: Kernel Ring 1: System calls Ring 2: Shared library Ring 3: User program

Kernel The core of the OS that manage the CPU, memory and I/O service

Security kernel The place where the security mechanism and policies are applied It prevents unauthorized access to system resources It implements the Reference Monitor concept

Kernel Part of the OS that performs the lowest level functions such as Synchronization Interprocess communication Message parsing Interrupt handling

Separate Security Kernel Level 1.Hardware 2.Security Kernel Access control Authentication 3. Operating System Resource allocation Sharing Hardware interactions 4. User tasks

Intel Premium Chip Ring Structure

Protection of shared objects No protection Isolation Share via access limitation (ACL) Refer Bell La Padula model Share by capabilities Limited use of an object (permissions) Process execution domain Namespace Share all or share nothing (declared public or private)

File protection Each file has a name and its data, the attributes. The attribute can be a protection field or a password File system such as NTFS can provide DACL to each individual file Encryption can also be applied to files

Access Control Matrix Operation System Accounts Program Accounting Data Audit Trail Sam (Sysop) rwx rwr Alice (Mgr) rxx - Bob (Auditor) rxrrr

Access Control List Operation System Accounts Program Accounting Data Audit Trail Sam (Sysop) rwx rwr Alice (Mgr) rxx - Bob (Auditor) rxrrr

Capacity Operation System Accounts Program Accounting Data Audit Trail Sam (Sysop) rwx rwr Alice (Mgr) rxx - Bob (Auditor) rxrrr

ACL of Unix Owner, Group, World Read, Write, Execute Example drwxrwxrwx Alice Accounts -rw-r----- Alice Accounts

ACL of Windows Many defined groups including everyone Finer division of privilege: Take ownership List folder content Delete etc. Use of domains and trust Groups policy to associate with sites, domains, and operating units in Active Directory

Well-formed Transaction Operation System Accounts Program Accounting Data Audit Trail Sam (Sysop) rwx rr Alice (Mgr) rxx-- Accounts Program rxrrww Bob (Auditor) rxrrr

Well-formed Transaction Access Triple of User Program File Refer the Clark Wilson model

Access Control Model Reference Monitor Subject Principal Request Object

Access Control Model Principals The user or machine that has a name and a SID The local user is Machine\principal The domain user is Domain\Principal Subject A program with a user identity Request Set of operations: read/write/execute/append/erase Object Resources, memory, files, registry, printer

Windows authorization model

Access Token Security credentials of subjects

Virtualization A virtual machine is a collection of real or simulated hardware facilities: a CPU that runs an instructor set, an amount of addressable memory space, and some I/O devices. This enables programs designed for that CPU be executed on the host computer.

Virtualization It provides another layer of control between the OS and the application programs in the computer system. Thus fault in one virtual machine does not affect the operation of another virtual machine, and the whole system. It is a sandbox for insecure operation

Reading Security in Computing Chapter 6