CIT 140: Introduction to ITSlide #1 CSC 140: Introduction to IT File Security.

Slides:



Advertisements
Similar presentations
Linux File & Folder permissions. File Permissions In Ubuntu, files and folders can be set up so that only specific users can view, modify, or run them.
Advertisements

Unix permissions, ownership and setuid File security and ownership The chmod(1) command Process Ownership Setuid, Setgid and the Sticky bit Writing setuid.
UNIX file systems Learning Objectives: 1. To understand the basics of file systems 2. To understand the hierarchical structure in Unix file system 3. To.
File Security. Viewing Permissions ls –l Permission Values.
File security and Permissions A file is owned by the user who created it That user can then specify who can read, write and execute that file A file when.
Linux+ Guide to Linux Certification, Second Edition
User Accounts and Permissions Chapter IV / Part II.
Building Secure Software Chapter 9 Race Conditions.
UNIX Files and Security Software Tools. Slide 2 File Systems l What is a file system? A means of organizing information on the computer. A file system.
UNIX Chapter 08 File Security Mr. Mohammad Smirat.
Linux File Security. What is Permission ? Specifies what right are granting to users to access the resources available in the computer. So that important.
LERSAIS.  Access Control in Unix  Access Control in Windows  Port Redirection 2.
Getting Started with Linux Linux System Administration Permissions.
File System Security 1. General Principles Files and folders are managed by the operating system Applications, including shells, access files through.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Chapter 3.3: Filesystem Security 1. General Definitions Files and folders (directories) are managed by the operating system Applications, including shells,
Filesystem Hierarchy Standard (FHS) –Standard of outlining the location of set files and directories on a Linux system –Gives Linux software developers.
Va-scanCopyright 2002, Marchany Unit 6 – Solaris File Security Randy Marchany VA Tech Computing Center.
Files & Directories Objectives –to be able to describe and use the Unix file system model and concepts Contents –directory structure –file system concepts.
1 Lecture 2 Working with Files and Directories COP 3344 Introduction to UNIX.
Introduction to UNIX / Linux - 4
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Linux+ Guide to Linux Certification, Second Edition
Managing Files CSCI N321 – System and Network Administration Copyright © 2000, 2011 by the Trustees of Indiana University except as noted.
Bash startup files Linux/Unix files stty Todd Kelley CST8207 – Todd Kelley1.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
CIT 500: IT Fundamentals Users and Filesystems 1.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
File Permission and Access. Module 6 File Permission and Access ♦ Introduction Linux is a multi-user system where users can assign different access permission.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
File Security and Permissions. File Permissions (1) u With respect to a particular file, Unix divides the set of all users on a system into three categories:
Security CS Introduction to Operating Systems.
Chapter 4: File Security & Permissions Also: Hard and Soft Links, see p77-80 &
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
Linux+ Guide to Linux Certification, Third Edition
Linux+ Guide to Linux Certification, Third Edition
PacNOG 6: Nadi, Fiji UNIX ™/ /Linux Permissions Hervey Allen Network Startup Resource Center.
Privileges: who can control what Introduction to Unix June 16, 2009 Papeete, French Polynesia Hervey Allen.
Privileges: who can control what Introduction to Unix May 24, 2008 Rabat, Morocco Hervey Allen.
Managing Files CSCI N321 – System and Network Administration Copyright © 2000, 2007 by the Trustees of Indiana University except as noted.
Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 5.1 © Copyright IBM Corporation 2008 Unit 5 File.
The Unix File system (UFS) Presented by: Gurpreet Singh Assistant Professor Department of School of Computing and Engineering Galgotias University.
1 Lecture 2 Working with Files and Directories COP 3353 Introduction to UNIX.
CSCI 330 The UNIX System Unit V Permissions. all access to directories and files is controlled UNIX uses discretionary access control (DAC) model each.
SCSC 455 Computer Security Chapter 3 User Security.
Chapter 8 File System Security. File Protection Schemes Password-Based Protection Encryption-Based Protection Protection-Based on Access Permission.
Linux Use the Command-Line Interface to Administer the System.
File System Security ls -l. First Columm d = directory l = symbolic link b = block special file c = character special file p = fifo (or named pipe) special.
1 Introduction to Unix. 2 What is UNIX?  UNIX is an Operating System (OS).  An operating system is a control program that helps the user communicate.
UNIX file systems Learning Objectives: 1. To understand the basics of file systems 2. To understand the hierarchical structure in Unix file system 3. To.
Jozef Goetz, expanded by Jozef Goetz, 2008 Credits: Parts of the slides are based on slides created by UNIX textbook authors, Syed M. Sarwar, Robert.
Chapter 2: Exploring the UNIX File System (For Tuesday Section) File and File Systems.
File System Security in Unix Annie Calpe. Overview Unix Basics File System Security: - Account Security: Passwords - File Permissions - Access Control.
Linux Filesystem Management
Privileges: who can control what
Permissions: who can control what Unix/IP Preparation Course July 19, 2009 Eugene, Oregon, USA
File permissions Operating systems I800
Lecture 2 Working with Files and Directories
Chapter 8 File Security.
Privileges: who can control what
Chapter 7 File and file System structure
Presented by, Mr. Satish Pise
Security and File Permission
Engineering Secure Software
The Linux Command Line Chapter 9
Operating System Security
Department of School of Computing and Engineering
The Attack and Defense of Computers
Figure 6-13: Managing Permissions
Presentation transcript:

CIT 140: Introduction to ITSlide #1 CSC 140: Introduction to IT File Security

CIT 140: Introduction to ITSlide #2 Questions What is security? Authentication –Users –Passwords –Groups Privacy Integrity Access Control –chmod

CIT 140: Introduction to ITSlide #3 What is Security? Security is the prevention of certain types of intentional actions from occuring in a system. –These potential actions are threats. –Threats that are carried out are attacks. –Intentional attacks are carried out by an attacker. –Objects of attacks are assets.

CIT 140: Introduction to ITSlide #4 Assets 1.Identity 2.Network bandwidth 3.Disk space 4.Confidential data

CIT 140: Introduction to ITSlide #5 Threats 1.Theft 2.Vandalism 3.Extortion 4.Con Games 5.Fraud

CIT 140: Introduction to ITSlide #6 Digital Threats: What’s Different Automation –Salami Attack from Office Space. Action at a Distance –Volodya Levin, from St. Petersburg, Russia, stole over $10million from US Citibank. Arrested in London. –Operators of CA BBS tried and convicted in TN court because TN had d/led pornography f/ CA. Technique Propagation –Criminals share techniques rapidly and globally.

CIT 140: Introduction to ITSlide #7 Authentication on UNIX Identity: username –Public knowledge –How would you find out someone’s username? Authentication: password –Secret –How would you find out someone’s password?

CIT 140: Introduction to ITSlide #8 Figuring out Passwords 1.Intentional disclosure –You tell someone your password. 2.Unintentional disclosure –Someone watches you type your password. –Someone finds where you wrote it down. 3.Guessing –Guess based on what you know about person. –Guess dictionary words + permutations. 4.Brute force –Try every combination of characters.

CIT 140: Introduction to ITSlide #9 Changing your Password Why? –Prevent it from being guessed. –Change periodically to avoid brute force attacks. How? –passwd

CIT 140: Introduction to ITSlide #10 Encryption-based Protection

CIT 140: Introduction to ITSlide #11 Access Control: Identity Access to system resources restricted Restrictions based on identity –User –Group –Anyone

CIT 140: Introduction to ITSlide #12 Access Control: Permissions Read –You can read the file with cat, more, etc. Write –You can modify the file with vi, OpenOffice, etc. Execute –You can run the file if it’s a program.

CIT 140: Introduction to ITSlide #13 Access Control

CIT 140: Introduction to ITSlide #14 Access Control: Directories Read –You can list directory contents with ls, etc. Write –You can create new files with touch, etc. –You can delete files with rm, etc. Execute –You can cd to the directory.

CIT 140: Introduction to ITSlide #15 Octal Codes for Access Control

CIT 140: Introduction to ITSlide #16 Access Control: Commands Determining File Access Privileges ls –l, ls –ld

CIT 140: Introduction to ITSlide #17 Access Control: Commands

CIT 140: Introduction to ITSlide #18 Access Control: Commands

CIT 140: Introduction to ITSlide #19 Access Control: Commands Changing File Access Privileges –chmod [options] octal-mode file –chmod [options] symbolic file

CIT 140: Introduction to ITSlide #20 Examples of chmod Command

CIT 140: Introduction to ITSlide #21 Access Control: chmod

CIT 140: Introduction to ITSlide #22 Access Control: chmod

CIT 140: Introduction to ITSlide #23 Access Control: chmod

CIT 140: Introduction to ITSlide #24 umask mask The access permission value on executable file or directory is computed by: file permission = 777 – mask Current Value of the mask: $ umask 777 $ Access Control: Commands

CIT 140: Introduction to ITSlide #25 Special Access Bits The Set-User-ID (SUID) Bit –Command runs with privileges of file owner when. –chmod 4xxx file-list –chmod u+s file-list The Set-Group-ID (SGID) Bit –Command runs with privileges of group owner. –chmod 2xxx file-list –chmod g+s file-list The Sticky Bit –Prevents non-owners from removing/renaming files in dir. –chmod 1xxx file-list –chmod +t file-list

CIT 140: Introduction to ITSlide #26 Special Bits Examples SetUID Bit > ls -l /etc/passwd /usr/bin/passwd -rw-r--r-- 1 root root /etc/passwd -rwsr-xr-x 1 root root /usr/bin/passwd SetGID Bit > ls –l /usr/bin/wall -rwxr-sr-x 1 root tty /usr/bin/wall Sticky Bit > ls -ld /var/tmp drwxrwxrwt 13 root root /var/tmp

CIT 140: Introduction to ITSlide #27 Special Access Bits