Bzupages.com. Operating System: Presented To: Sir. Ahsan Raza Presented By: Shaista Sumreen (06-04) Aliya Zafar (06-06) Mamoona Sadia (06-08) Javaria.

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Operating System Structures
CS426Fall 2010/Lecture 71 Computer Security CS 426 Lecture 7 Operating System Security Basics.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Distributed System Structures Network Operating Systems –provide an environment where users can access remote resources through remote login or file transfer.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Access Control Methodologies
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Database Management System
Fundamentals of Computer Security Geetika Sharma Fall 2008.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
1 Pertemuan 04 Pengamanan Akses Sistem Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Lecture 11 Reliability and Security in IT infrastructure.
Chapter 12 File Management Systems
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Introduction (Pendahuluan)  Information Security.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Today’s Lecture Covers < Chapter 6 - IS Security
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
SYSTEM ADMINISTRATION Chapter 1 Logical and Physical Network Topologies.
CS551 - Lecture 18 1 CS551 Object Oriented Middleware (VII) Advanced Topics (Chap of EDO) Yugi Lee STB #555 (816)
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Note1 (Admi1) Overview of administering security.
Information Security What is Information Security?
Unix Security.  Security architecture  File system and user accounts  Integrity management  Auditing and intrusion detection.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Concurrency Control. Objectives Management of Databases Concurrency Control Database Recovery Database Security Database Administration.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Chapter 2 Securing Network Server and User Workstations.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Day12 Network OS. What is an OS? Provides resource management and conflict resolution. –This includes Memory CPU Network Cards.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
System Components Operating System Services System Calls.
Securing Network Servers
Outline What does the OS protect? Authentication for operating systems
UNIT 19 Data Security 2.
Outline What does the OS protect? Authentication for operating systems
Lesson 16-Windows NT Security Issues
Chapter 2: Operating-System Structures
Introduction to Operating Systems
Topic 5: Communication and the Internet
ONLINE SECURE DATA SERVICE
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
Chapter 2: Operating-System Structures
Presentation transcript:

bzupages.com

Operating System: Presented To: Sir. Ahsan Raza Presented By: Shaista Sumreen (06-04) Aliya Zafar (06-06) Mamoona Sadia (06-08) Javaria Qayyum (06-26) Sana Tareen (06-31) Sadia Riaz (06-33)

bzupages.com Services of Operating System: Process Management Multi-Tasking Interrupt Processing Memory Management Registers Random Access Memory Disk Storage Disk & File System Networking Security

bzupages.com

Outline Operating System Security Protection Mechanism H/W Security Protection of Memory Access Control Mechanism Auditing Fault Tolerance Summary

bzupages.com Shaista Sumreen Topic Protection Mechanism H/W Security

bzupages.com Protection Mechanism:(1) Operating system security is provided by gates that users must pass through before entering the operating system environment, and permission matrixes that determine what they are able to do once inside.

bzupages.com Protection Mechanism:(2) Dialup gate Login gate Root gate Secure RPC gate File and directory matrix NIS+ objects matrix

bzupages.com Protection Mechanism: O.S provides protection with following Spectrum: No protection Isolation Share all Or Share nothing Share via access limitation Share via dynamic capabilities Limited use of an object

bzupages.com Hardware Security:(1) Problem??? Examples: Telephone SIM cards Smart cards (used for access, TV decoders, ID, money...) Public ATM machines

bzupages.com Hardware Security:(2) Install a version of the PROM monitor that either does not provide (or at least password protects) the commands to examine and change memory contents. Ensure that workstations cannot be taken into single-user mode without providing the "root" (or a PROM monitor "hardware") password.

bzupages.com Protecting data from hardware failures:(3) Use Backups. Use Redundant Arrays of Inexpensive Disks (RAID). Failure of a single disk should not cause any data loss. Beware of manufacturers.

bzupages.com Protection Of Memory: Memory Encryption Control Unit (MECU) encrypts all memory transfers between the level 2 cache and main memory. The keys used to encrypt memory blocks are derived from secret information present on removable authentication tokens, e.g., smart card, or other similar secure storage devices. This provides protection against physical attacks in absence of the token. User Oriented Data Oriented

bzupages.com User Oriented Access Control: User access control in distributed environment can be either centralized or decentralized. 1.In a centralized approach network provides a log on service, determining who is allowed to use the network and to whom the user is allowed to connect. 2.Decentralized user access control treats the network as a transport communication link, and the destination host carries out the usual log on procedure.

bzupages.com User Oriented Access Control: Authenticating users Commonly done using id and password Concern about eavesdropping May be centralized (network logon) or distributed (each host handles logon) May also limit who can access the network as a whole

bzupages.com Data Oriented Access Control: Each user has permitted actions Anyone in administration can see the list of employees, but only personnel staff can change someone’s salary Access matrix (Subjects x Objects) Subject — Entity that can access objects Object — Anything to which access is controlled Access Right — The way the object is accessed by the subject

bzupages.com Data Oriented Access Control: Generally matrix is sparse, so stored in a different fashion: Access Control List Who is allowed to do something with this object Capability List What can this user do?

bzupages.com Javeria Qayyum Topic Access Control

bzupages.com Access Control:

bzupages.com Strategy: Try user info variants Try words from 60,000 entry dictionary Try permutations of above (0-O, 1-L, etc.) Try various capitalization of above

bzupages.com Protecting Password:

bzupages.com Sadia Riaz Topic Auditing

bzupages.com Auditing: Record of ongoing activity Most systems include auditing files Intruder detection system may have additional files Detection-specific audit records Subject — Who is doing the action? Action — What is being done? Object — What is being used? Exception condition — Any problems? Resource usage Timestamp — When did it happen? Each record refers to an elementary action Easier to detect intrusions Simplifies model and implementation

bzupages.com Sana Tareen Topic Fault Tolerance Introduction Requirements

bzupages.com Introduction: What is the System??? 3 Levels of Fault Tolerance 1.H/W fault tolerance 2.S/W fault tolerance 3.System fault tolerance

bzupages.com “A system is the entire set of components, both computer related, and non-computer related, that provides a service to a user.”

bzupages.com Requirements: Dependable System Approaches to achieve dependability 1.Fault avoidance 2.Fault Removal 3.Fault Tolerance Dependability Specification 1.Qualitative 2.Quantitative

bzupages.com Mamoona Sadia Topic Classes of Fault Tolerance Mechanism

bzupages.com Fault Classes: Locality Effects (Timing & Date) Cause (Design, Damage) Duration (Transient, Persistent) Efforts On the System State 1.Crash 2.Amesia

bzupages.com Mechanism: Detection Diagnose Containment

bzupages.com Aliya Zafar Summary of Presentation

bzupages.com Thanks