Unix Systems security and security evaluation criteria.

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Six Open Source Software.
Advertisements

Ubiquitous Computing Technology Research Institute Sungkyunkwan University Using Ethereal - Packet Capturing & Analysis Tool Sungkyunkwan University.
Chapter 16: Standardization and Security Criteria: Security Evaluation of Computer Products Guide to Computer Network Security.
IT Security Evaluation By Sandeep Joshi
COMPUTER SYSTEMS OPERATING SYSTEMS AND SOFTWARE NEXT.
Chapter 5 Operating Systems. 5 The Operating System When working with multimedia, the operating system is perhaps the most important, the most complex,
1 Information Security Standards Gary Gaskell © 2001.
Lecture 6a - Overview of operating systems CSCI102 - Introduction to Information Technology B ITCS905 - Fundamentals of Information Technology.
Introduction to UNIX Acknowledgement:Thanks to Dr Andrew Horner for the original version of this set of slides. All trademarks are the properties of their.
Unix Systems Administration 1Y. K. Chang UNIX History : Bell Lab joined with GEC and Project MAC of MIT to develop Multics: multi-user and data-sharing.
Operating Systems Or why is Bill Gates so rich? Computers Mr. Specter Steel Valley High School Or why is Bill Gates so rich? Computers Mr. Specter Steel.
Introducing Linux 1 st AUT GNU/Linux Festival Computer Engineering & IT Department Bahador Bakhshi.
Operating Systems Every computer has two fundamental components: hardware and software The term hardware refers to the physical components inside a computer.
Chapter 4 - Software – Part 2 Dr. V.T. Raja Oregon State University.
Introduction to UNIX Acknowledgement:Thanks to Dr Andrew Horner for the original version of this set of slides. All trademarks are the properties of their.
Free and open-source software (also known simply as Free software or Open source software) is software created by loose networks of people (both companies.
Brief History of C and Unix Systems Programming Concepts.
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
OPEN OFFICE PREPARED BY: Mantilla, Leia Anjelica A. Pitogo, Adones B. Verdida, Reymond J.
Unix Presentation. What is an Operating System An operating system (OS) is a program that allows you to interact with the computer -- all of the software.
Introduction to Computer Administration System Administration
PHP Web Development, PHP Programming
Learning Outcomes At the end of this lesson, students should be able to: State the types of system software – Operating system – Utility system Describe.
Lecture 2 History of Operating Systems. Early History: The 1940s and 1950s Operating systems evolved through several phases. 1940s: Early computers did.
What is UNIX? UNIX is an Operating System (OS). An operating system is a control program that helps the user communicate with the computer hardware. UNIX.
Web Server A software program or server computer equipped to offer World Wide Web access. Web servers allow you to serve content over the Internet using.
Chapter 10 – UNIX. History In late 1960s, two employees of Bell Labs (Ken Thompson & Dennis Ritchie) designed a new operating system to overcome the constraints.
LINUX/UNIX WORKSTATIONS Franklin Montenegro Carlos Sierra.
유닉스, 왜 공부하나 ? 자동화 –GUI vs commands 서버 개발 능력, 관리 능력 – 데스크탑에서의 개발과 관리와의 차이 ?
Choosing NOS can be a complex and a difficult decision. Every popular NOS has its strengths and weaknesses. NOS may cost thousands of dollars depending.
A Comparison of Linux vs. Windows Bhargav A. Sorathiya B.E. 4 th C.E. Roll no:6456.
Chapter Ten Networking with UNIX. Brief History of UNIX System V (1960’s) Versions of UNIX that come from Bell Labs Versions of UNIX that come from Bell.
Motorola & IBM’s PowerPC Overview of Wesley Davis.
Open Source Business Software Solutions for Autumn Streak Daniel Callahan Ross Eshleman Sarah Caruso.
Readers choice 1999 Most affordable database 1998 Database of the year 1998.
CMPF124 Basic Skills For Knowledge Workers Chapter 1 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
University of Utah 1 Andy van Dam lecture thoughts?
CS2204: Introduction to Unix January 19 th, 2004 Class Meeting 1 * Notes adapted by Christian Allgood from previous work by other members of the CS faculty.
IPv6 Experiment Roque Gagliano The idea  To taste IPv6 by yourself today at the meeting.  30 minutes of IPv6 only content.  We have.
Berkeley Software Distribution
® IBM Software Group © 2006 IBM Corporation New Processor Value Unit Licensing for Middleware Evolving the Structure to Provide a Foundation for the Future.
The OSS Paradigm Shift Sherif El-Kassas Department of Computer Science The American University in Cairo.
CMPF124 Basic Skills For Knowledge Workers Chapter 1 – Part 1 Introduction To Windows Operating Systems.
Introduction to UNIX Karl Harrison September 2004.
Background & History of UNIX & Linux Fort Collins, CO Copyright © XTR Systems, LLC The Background and Short History of UNIX & Linux Instructor: Joseph.
Introduction to UNIX CS 2204 Class meeting 1 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright
Introduction to UNIX CS465. What is UNIX? (1) UNIX is an Operating System (OS). An operating system is a control program that allocates the computer's.
A Quick UNIX Primer MIS 3321 Fall, 2014 University of Central Arkansas.
CEG 2400 FALL 2012 Linux/UNIX Network Operating Systems.
Computer Software Introduction Software Classification Operating systems End user Applications Programmers’ tools Utilities.
UNIX Operating System. A Brief Review of Computer System 1. The Hardware CPU, RAM, ROM, DISK, CD-ROM, Monitor, Graphics Card, Keyboard, Mouse, Printer,
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
Class Meeting 11 ITI-481 – UNIX ADMIN Chris Uriarte, Instructor ITI-481: Unix Administration Rutgers University Internet Institute Instructor: Chris Uriarte.
® IBM Software Group © 2006 IBM Corporation IBM Internal Use Only--Not to be shared outside the company until July 25, 2006 New Processor Value Unit Licensing.
Outline  XAMPP  XAMPP Install  Put php and HTML documents  Windows and Mac Version  Security.
Berkeley Lab Software Distribution Site NLIT Dan Pulsifer - Engineering May 11 th, 2008.
Antonio Hansford ITEC 400 Berkeley Software Design April 14, 2016.
Introduction to unix. The UNIX Operating System An operating system "OS” is a set of programs that controls a computer. It controls both the hardware.
UDel CISC361 Study Operating System principles - processes, threads - scheduling - mutual exclusion - synchronization - deadlocks - memory management -
Chapter 5 Operating Systems.
Karl Harrison September 2004
Operating System & Application Software
OPEN SOURCE.
open source and free software Najeeb Ullah Student ID
CHAPTER 8 - OPERATING SYSTEM HISTORY
OPEN SOURCE.
Computer Software Lecture 5.
OPEN SOURCE BY :.
برامج النظام Software Systems
Database Software.
Presentation transcript:

Unix Systems security and security evaluation criteria

Agenda Overview of UNIX Flavors and versions of UNIX Open source vs proprietary software Security evaluation criteria Ten general security rule

Flavors and versions of UNIX Following are the example of The proprietary flavors of unix that have been designed to run only (or mainly) on proprietary hardware sold by the same company – AIX - developed by IBM for use on its mainframe computers – BSD/OS - a commercial version of BSD developed by Wind River for Intel processors – HP-UX - developed by Hewlett-Packard for its HP 9000 series of business servers – IRIX - developed by SGI for applications that use 3-D visualization and virtual reality – QNX - a real time operating system developed by QNX Software Systems primarily for use in embedded systems – Solaris - developed by Sun Microsystems for the SPARC platform and the most widely used proprietary flavor for web servers – Tru64 - developed by Compaq for the Alpha processor

Flavors and versions of UNIX Others are developed by groups of volunteers who make them available for free. Among them are: – Linux - the most popular and fastest growing of all the Unix-like operating systems – FreeBSD - the most popular of the BSD systems (all of which are direct descendants of BSD UNIX, which was developed at the University of California at Berkeley) – NetBSD - features the ability to run on more than 50 platforms, ranging from acorn26 to x68k – OpenBSD - may have already attained its goal of becoming the most secure of all computer operating systems – Darwin - the new version of BSD that serves as the core for the Mac OS X

Open source vs. Proprietary software Open source software – Some example are Linux distribution, PHP, Apache, gdb, XML, gcc, java, perl etc Proprietary software – Example are Microsoft windows, Exchange server, Adobe Acrobat, Photoshop, Mac os etc

Security evaluation criteria Computer security evaluation? – is the detailed examination and testing of the security features of an IT system or product to ensure that they work correctly and effectively and do not show any logical vulnerabilities. – It includes a claimed level of Assurance that determines how rigorous the evaluation is. Criteria – Criteria are the "standards" against which security evaluation is carried out.

Security evaluation criteria TCSEC(Trusted Computer System Evaluation Criteria) – The US Department of Defense published the first criteria in 1983 as the TCSEC – more popularly known as the "Orange Book". – The current issue is dated – The US Federal Criteria were drafted in the early 1990s as a possible replacement but were never formally adopted. ITSEC (Information Technology Security Evaluation Criteria) – During the 1980s, the UK, Germany, France and the Netherlands produced versions of their own national criteria. These were harmonised and published as the ITSEC.

Security evaluation criteria Common Criteria – The Common Criteria represents the outcome of international efforts to align and develop the existing European and North American criteria. – The Common Criteria project harmonizes ITSEC, CTCPEC (Canadian Criteria) and US Federal Criteria (TCSEC)into the Common Criteria for Information Technology Security Evaluation (CC) for use in evaluating products and systems and for stating security requirements in a standardized way.

Ten general security rule Rule 1: Security Through Obscurity Doesn't Work Rule 2: Full Disclosure of Bugs and Holes Benefits Security Rule 3: System Security Degrades in Direct Proportion to Use Rule 4: Do It Right Before Someone Does It Wrong For You Rule 5: The Fear of Getting Caught is the Beginning of Wisdom

Ten general security rule Rule 6: There's Always Someone Out There Smarter, More Knowledgeable, or Better- Equipped Than You Rule 7: There Are No Turnkey Security Solutions Rule 8: Good and Evil Blend into Gray Rule 9: Think Like the Enemy Rule 10: Trust is a Relative Concept