Chapter 3.2: Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as.

Slides:



Advertisements
Similar presentations
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Operating Systems Computer Science: An Overview Tenth Edition.
Advertisements

Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
Linux+ Guide to Linux Certification Chapter Nine System Initialization.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
CSUF Chapter CSUF Operating Systems Security 2.
The Operating System. What is an Operating System? The software which makes it possible for you to use your computer The software which starts up when.
Operating-System Structures
Section 3.2: Operating Systems Security
Chapter 11 Exploring Windows XP Vol. 1 Part One - Windows XP Professional: The Basics.
CSCE101 – Ch 3 September 14 & 16, Chapter 3 Computer Software = System Software + Application Software Delineation unclear – (ex. Microsoft Antitrust)
MCT260-Operating Systems I Operating Systems I Introduction to Operating Systems.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Technology Fundamentals 6 th pd. Terms to know Decimal Binary Hexadecimal Input Output Operating system Printer firewall Hardware Software Data Mainframe.
Operating Systems.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
The Impact of Physical Security on Network Security
Linux+ Guide to Linux Certification Chapter Three Linux Installation and Usage.
Computer Organization
Data Security.
Linux Booting Procedure
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 14 Managing and Troubleshooting Windows 2000.
CS 1308 Computer Literacy and the Internet. Introduction  Von Neumann computer  “Naked machine”  Hardware without any helpful user-oriented features.
Software GCSE COMPUTING.
Chapter 3 Partitioning Drives using NTFS and FAT32 Prepared by: Khurram N. Shamsi.
Topic 6: Further System Fundamentals. Fetch-Execute Cycle Review Computer programs are instructions stored in RAM Processor fetches instructions and executes.
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Chapter 3 Operating Systems © 2007 Pearson Addison-Wesley. All rights reserved.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Operating Systems Security
Chapter 3 Operating Systems. © 2005 Pearson Addison-Wesley. All rights reserved 3-2 Chapter 3 Operating Systems 3.1 The Evolution of Operating Systems.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Operating Systems Security 1. The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or.
Operating System (Reference : OS[Silberschatz] + Norton 6e book slides)
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
IT Chapter 2 Part A How Computers Work Input, process, output, and storage The operating system helps the computer perform four basic operations,
Copyright © 2003 by Prentice Hall 1 Computers: Tools for an Information Age Chapter 3 Operating Systems: Software in the Background BSM025 Computers.
Nat 4/5 Computing Science Software
Chapter Objectives In this chapter, you will learn:
Operating System & Application Software
Trusted Computing and the Trusted Platform Module
Chapter 3: Operating Systems
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
CIT 480: Securing Computer Systems
Chapter 2: System Structures
TOPIC 6: SYSTEM START-UP AND CONFIGURATION
Chapter 4 – Introduction to Operating System Concepts
THE OPERATION SYSTEM The need for an operating system
Introduction to Operating System (OS)
Computer System Structures
Outline What does the OS protect? Authentication for operating systems
What is an Operating System?
Operating Systems Concepts
Chapter 4.
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 5 Mumtaz Ali Rajput +92 – 301-
Starting the computer. Every day we are using an operating system and most specifically a Windows operating system but most of us are not aware of the.
The Operating system Gives life to the hardware
BIOS Chapter 6.
Bethesda Cybersecurity Club
Chapter 3: Operating Systems
Modern PC operating systems
Chapter 3: Operating Systems
Chapter 3: Operating Systems
Chapter 3: Operating Systems Computer Science: An Overview
TPM, UEFI, Trusted Boot, Secure Boot
Chapter 3: Operating Systems
Presentation transcript:

Chapter 3.2: Operating Systems Security 1

The Boot Sequence The action of loading an operating system into memory from a powered-off state is known as booting or bootstrapping. When a computer is turned on, it first executes code stored in a firmware component known as the BIOS (basic input/output system). On modern systems, the BIOS loads into memory the second-stage boot loader, which handles loading the rest of the operating system into memory and then passes control of execution to the operating system. 2

BIOS Passwords A malicious user could potentially seize execution of a computer at several points in the boot process. To prevent an attacker from initiating the first stages of booting, many computers feature a BIOS password that does not allow a second- stage boot loader to be executed without proper authentication. 3

Hibernation Modern machines have the ability to go into a powered-off state known as hibernation. While going into hibernation, the OS stores the contents of machine’s memory into a hibernation file (such as hiberfil.sys) on disk so the computer can be quickly restored later. But… without additional security precautions, hibernation exposes a machine to potentially invasive forensic investigation User closes a laptop computer, putting it into hibernation. 2. Attacker copies the hiberfil.sys file to discover any unencrypted passwords that were stored in memory when the computer was put into hibernation.

Event Logging Keeping track of – what processes are running, – what other machines have interacted with the system via the Internet, and – if the operating system has experienced any unexpected or suspicious behavior can often leave important clues not only for troubleshooting ordinary problems, but also for determining the cause of a security breach. 5

Process Explorer 6

Seeing Processes On Windows, ctrl/alt/del  choose task manager  select processes On Linux, ps lists your processes. Various switches allow access to system wide processes. For example, ps –e lists all processes on the machine. 7

Memory and Filesystem Security 8 The contents of a computer are encapsulated in its memory and filesystem. Thus, protection of a computer’s content has to start with the protection of its memory and its filesystem. These are often protected by passwords and encryption.