 Focus on various part of the operating system can achieve the security and protection according to the organization’s requirement.  External and internal.

Slides:



Advertisements
Similar presentations
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Protection and Security. Policy & Mechanism Protection mechanisms are tools used to implement security policies –Authentication –Authorization –Cryptography.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Chapter 12 Network Security.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Operating Systems Protection & Security.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
CIS 450 – Network Security Chapter 8 – Password Security.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
Encryption Objective 1: Explain data encryption procedures.
Cryptography, Authentication and Digital Signatures
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Types of Electronic Infection
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Information Security in Distributed Systems Distributed Systems1.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
CPT 123 Internet Skills Class Notes Internet Security Session B.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 11: Security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Information Systems Design and Development Security Precautions Computing Science.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Secure Software Confidentiality Integrity Data Security Authentication
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
THE STEPS TO MANAGE THE GRID
12: Security The Security Problem Authentication Program Threats
CLIENT/SERVER COMPUTING ENVIRONMENT
Chapter 4 Cryptography / Encryption
Operating System Security
Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Chinese wall model in the internet Environment
ONLINE SECURE DATA SERVICE
Operating System Concepts
Operating System Concepts
Test 3 review FTP & Cybersecurity
Operating Systems Concepts
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

 Focus on various part of the operating system can achieve the security and protection according to the organization’s requirement.  External and internal security.  Security threat such as virus, malware and worms.  Security issues and its approach implementation. LEARNING OUTCOMES Students knows the security and protection related in computing environment. The importance of security and protection for all operating system Various type of security threats

INTRODUCTION

Security policy defines the rules for authorizing access to its computer and information resources. Protection mechanisms are tools for implementing the organization’s security policy.. MechanismPolicy a set of components used to implement any one of different sets of strategies. particular strategy that dictates the way a mechanism is used to achieve specific goals. Implement in the OS when it is necessary to perform. Implement after OS and its protection mechanisms have been implemented Small part of the OS implements the mechanisms. System software, user software determine the policy

 concerned with determining whether a user is the person claimed to be.  The simplest form of external authentication is to associate a password with each account  must ensure that a process cannot appear to be a process other than itself.  Without internal authentication, a user could create a process that appear to be a process that belongs to another user External authenticationInternal authentication

 Authorization mechanism ensures that users or processes are allowed to use entities in the computer (such as resources) only if the policy permits such use.  When a user attempts to access the computer, an external access authorization mechanism first authenticates the user’s identity and then checks to see if that user is authorized to access the computer.

 Authentication systems provide an answer to the questions: › Who is the user? › Is the user really who she/he represents himself to be?  Authorization system provide answer to the questions: › Is user X authorized to access resource R? Authentication and authorization are somewhat tightly – coupled mechanism authorization system depends on secure authentication system.

SERVICE AUTHORIZATION SERVICE Stores info about user access levels What can user X do? AUTHENTICATION SERVICE Verifies user id entity Is this user X? CLIENT

 Encryption is a technique for encoding information into a form where its meaning is obscured as ciphered text. EncryptionDecryption PlaintextOriginal PlaintextCiphertext

 The OS is the software agent with which users interact when they initiate a session with the system. The OS needs to verify that users are who they claim to be.  The combination of user identification and password is widely used in operating systems for user identification.  Contemporary protection systems may even resort to methods such as fingerprint or eye scan identification.

 Today network authentication mechanism are especially necessary to detect incoming files that may contain a virus or a worm.  A virus is a software module hidden inside another module. Established in a file system by replacing some existing module as a bug fix or as an upgrade.  A worm is an active penetrating entity, may enter the machine as file, but then will begin execution on its own. Once a file containing a worm has been placed in the file system, the worm finds a loophole in the process manager in order to execute itself

 Sharing parameters : A process’s resources policy may be violated if other processes can indiscriminately change parameter values within its address space.  Confinemen t: confinement is a generalization of the problem of sharing parameters. Limit the distribution of info to others.  Allocating rights : a protection system may allow a process to provide another process with specific rights to use its resources.  Trojan horse : the Trojan horse problem is a special case of the problem of allocating rights – a service program being used by a client process using its own right.

 Cryptography techniques can be used to convert clear text (or plain text) to ciphered text to protect the text whenever it is exposed on an unprotected medium.  There is a class of symmetric encryption technique in which the encryption key is the same as the decryption key.  Asymmetric encryption and decryption are required in cases in which different subjects perform the encryption and decryption.

EncryptionDecryption PlaintextOriginal PlaintextCiphertext EncryptionDecryption PlaintextOriginal PlaintextCiphertext Key Encryption Key Decryption Key Symmetric Asymmetric

1. Which of these description below is TRUE for the following function: A. Encodes the clear text into ciphertext B. Decrypt the clear text into ciphertext C. Encodes to translate the ciphertext back into clear text D. Decrypt to translate the ciphertext back into clear text Encrypt(key, clearText) = clearText

2. The __________ is a generalization of the problem of sharing parameters. 3. Security policy defines the rules for authorizing access to its computer and information resources. Differentiate between Mechanisms and Policy(2m). 4. Describe 2 types of Authentication Mechanisms(4m). 5. Internal authorization is part of the task of managing resource sharing. List 4 internal access authorization mechanisms.(4m)

6. Briefly explain each term given below:  Policy(2m)  Protection Mechanism(2m)  Encryption(2m)  Security policy(2m) 7. Differentiate between authentication and authorization(4m). 8. State the differentiate between computer virus and worm