Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
System Security Scanning and Discovery Chapter 14.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Information Security Policies and Standards
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 7 HARDENING SERVERS.
File Management Systems
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Chapter 12 File Management Systems
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Hands-On Microsoft Windows Server 2008
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
What does “secure” mean? Protecting Valuables
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
DCE (distributed computing environment) DCE (distributed computing environment)
Data Integrity Lesson 12. Skills Matrix Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
G53SEC 1 Access Control principals, objects and their operations.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 10: Rights, User, and Group Administration.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Understand Audit Policies LESSON Security Fundamentals.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Privilege Management Chapter 22.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Information Systems Security
Securing Network Servers
Operating System Security
Secure Software Confidentiality Integrity Data Security Authentication
Operating System Security
BACHELOR’S THESIS DEFENSE
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Operating System Security

OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems support four basic functions –Positively identify a user –Restrict access to authorized resources –Record user activity –Ensure proper communications with other computers and devices (sending and receiving data)

Organizing System Security Identify and authenticate a user –Typically through username/password combination Next, authorize a user for specific access –Can be based on roles, security labels, identification, etc. Security functionality is generally layered –At least a user layer and a kernel layer –The reference monitor that intercepts and authorizes requests is part of the security kernel –Kernel programs often have a high privilege level

Built-in Security Subsystems OSs default to low security out of the box –The process of increasing the security level is called hardening As operating systems mature, more security functionality is being built in –For example, Kerberos ships with current Windows products Identification and authentication are mainly generic –Other security functionality differs among products

System Security Principles and Practices Security planning starts with understanding potential risks –Use risk assessment to determine and rank risks –Implement controls for important risks (harden the system) –A control is a mechanism that limits access to an object Test results of hardening –Controls are working –Access is not so restrictive that system doesn’t operate properly Train users to understand and use proper security

Windows Security Design Windows security model differs among products –Model described here is for Windows server security Built on the concept of Active Directory –A directory service data structure that enables access and addressing of objects across a network Objects are files, folders, shares, printers Subjects are logically grouped Each object has a discretionary access control list (DACL) Conflicts resolved by giving priority to the most specific rule governing an object and by giving priority to “deny” over “allow”

Windows Security Design Network resources (printers, computers, users, etc.) are grouped in domains –Domains can be hierarchically grouped into trees and forests –Access rules are specified at the domain level and inherited through groups and individual objects The Active Directory data structure can be physically distributed Local security is specified in local security objects

Windows Security Design

UNIX and Linux Security Design Basic security is constructed around files –Everything is presented as a file (files, directories, devices, processes) Understanding file permissions is crucial Each file has a mode field –10 character field that specifies type of file and permissions for the owner, group, and world –Permission types are read, write, and execute –View the mode field using the ls –l filename command

System Backups A backup is a complete or partial copy of the system –Typically stored on removable media –Typically scheduled on a regular basis Used to recover from problems with system, attacks, disasters, etc. Can be a major vulnerability –A portable copy of your system is easier to gain access to –Must be very careful to protect your backups Be sure that you verify the media on which you copy your system –Backups on an old or poor quality media may not be restorable

Typical System Security Threats Threats come in two forms –A subject is given more authorization to access or modify resources than he or she should have –Authorized subjects are denied access to resources they should be able to use Software bugs are a common security threat –Caused by sloppy programming –Provide opportunities to attackers by leaving system in an unexpected state, sometimes with high privilege levels –Best defense is to have well trained programmers and follow establish software development methods

Typical System Security Threats Back Doors –An entry point into a program that bypasses the normal security mechanisms –Software developers often include these for easier development and testing –Can be used by developer for malicious purposes or discovered by an attacker –Defense is good formal testing of software

Typical System Security Threats Impersonation or Identity Theft –Compromising a password gives an attacker a way to impersonate or hijack a user’s identity –Users often do not protect their passwords appropriately –Insidious because audit logs can’t distinguish between the real user and the attacker –Defense is to teach users the importance of password security

Keystroke Logging A set of methods used to intercept the keystrokes a user enters Types of tools –Software tools require privilege to install –Hardware tools plug into the keyboard –A video camera can be focused on the keyboard Keystroke logging is used for multiple purposes –Testing and quality assurance (replay keystrokes for repetitive tests) –Evidence collection when inappropriate activity is suspected –Malicious attacks when an attacker is able to compromise security

Well-Known Operating System Risks Attackers are well aware of the security vulnerabilities in operating systems The SANS/FBI Twenty Most Critical Internet Security Vulnerabilities is an up-to-date list of known vulnerabilities for Windows and UNIX operating systems Current lists along with detailed descriptions of the vulnerabilities are available at

Well-Known Windows Risks The top three Windows vulnerabilities are: –Internet Information Services (IIS), Microsoft’s Web server Vulnerable to unexpected requests and buffer overflows Sample users and applications are often unprotected after installation –Microsoft Data Access Components (MDAC) – Remote Data Services Older versions only allow attackers to run commands locally with administrator privilege –Microsoft SQL Server Attackers can access database contents because of issues with open ports and insecure default users and sample applications

Well-Known UNIX Risks The top three UNIX vulnerabilities –Remote Procedure Calls (RPCs) Can allow an attacker to get access to root privileges on a remote computer –Apache Web Server Generally considered more secure than IIS, but still has possible vulnerabilities if not configured carefully –Secure Shell (SSH) SSH is considered much more secure than alternatives, but still requires careful configuration and does contain some software vulnerabilities

System Forensics: Scanning and Footprinting Security administrators should regularly assess the current status of a computer by locating and analyzing stored status data Computer forensics is the process of searching for evidence of a specific activity by searching log files and file systems System footprinting (baselining) is a “snapshot” of the computer at a particular point in time for comparison purposes –Often first done immediately after a computer is brought online

Security Auditor’s Role The security auditor and the security administrator should be different people The security auditor’s job is –To validate the effectiveness of controls being used to mitigate threats –To ensure compliance with the controls –To ensure that legal requirements are satisfied The existence of formal auditing can be important in any legal proceedings related to computer security

Assessing Security Risks Risk assessment is the process of identifying potential risks and ranking them To assess risks –Start with a list of the assets that must be protected –Rank the importance of the assets –Create a list of events that could cause data loss, whether from natural, man-made, or malicious causes Make sure to include management in this process –Determine which threats can be reasonably addressed –Risk priorities are determined using quantitative and qualitative risk analysis techniques