Outline Objective: –Access Control Mechanisms. The Security Environment Threats Security goals and threats.

Slides:



Advertisements
Similar presentations
Chapter 9 Security 9.1 The security environment
Advertisements

Lecture 5: Cryptographic Hashes
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
1 Pertemuan 23 Sistem Keamanan Matakuliah: T0316/sistem Operasi Tahun: 2005 Versi/Revisi: 5.
1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Chapter 9 Security Environment Basics of Cryptography Protection Mechanisms Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
BR1 Protection and Security B. Ramamurthy Chapters 18 and 19.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Operating Systems Protection & Security.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Security 0 The Secure Environment. Security 1 The Secure Environment Security goals (C.I.A.) and threats.
Operating Systems 1 K. Salah Module 6.0: Security and Protection  Types of misuse: –1. Accidental –2. Intentional –Protection is to prevent either accidental.
1 Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Outline for Today’s Lecture Administrative: –If you weren’t here last time, pick up midterm –Assignment 3 still in progress Objective: –Security –Access.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
Security Chapter 9 Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Lecture 2: Introduction to Cryptography
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
CSIT324 OS &WEB INTERFACE SECURITY Introduction. C OURSE O UTLINE Concepts Security environment: Threats, intruders, accidental data loss. Cryptography.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
Outline for Today’s Lecture Administrative: –Happy Thanksgiving –Sign up for demos. Objective: –Peer-to-peer file systems Mechanisms employed Issues Some.
Outline for Today’s Lecture Administrative: Objective: –Access Control Mechanisms (cont.) –Security risks.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Cryptographic Hash Function
Chapter 9 Security 9.1 The security environment
Chapters 14,15 Security.
Fundamental Concepts in Security and its Application Cloud Computing
Resource Management Chapter 19 9/20/2018 Crowley OS Chap. 19.
Chapter 9 Security 9.1 The security environment
CE Operating Systems Lecture 21
Enabling Technology1: Cryptography
Security.
Chapter 14: Protection.
Chapters 14,15 Security.
Protection and Security
Operating System Concepts
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

Outline Objective: –Access Control Mechanisms

The Security Environment Threats Security goals and threats

Intruders Common Categories 1.Casual prying by nontechnical users 2.Snooping by insiders 3.Determined attempt to make money 4.Commercial or military espionage

Accidental Data Loss Common Causes 1.Acts of God -fires, floods, wars 2.Hardware or software errors -CPU malfunction, bad disk, program bugs 3.Human errors -data entry, wrong tape mounted, rm *

Reliability Mechanisms (Redundancy) Replication of data, geographically distributed –As simple as backups –First-class replication (Coda) Error detection-correction –Parity bits, checksums –Voting schemes

Step 0: Basics of Cryptography Relationship between the plaintext and the ciphertext

Entertainment Break

Intrusions listen alter insert

Monoalphabetic substitution –each letter replaced by different letter Given the encryption key, –easy to find decryption key Secret-key crypto called symmetric-key crypto –If keys are long enough there are OK algorithms –Secret key must be shared by both parties –DES (Data Encryption Standard) Secret-Key Cryptography

Public-Key Cryptography All users pick a public key/private key pair –publish the public key –private key not published Public key is the encryption key Private key is the decryption key RSA (Rivest, Shamir, Adelman)

One-Way Functions Function such that given formula for f(x) –easy to evaluate y = f(x) But given y –computationally infeasible to find x Example: Hash functions – produce fixed size result –MD5 – Rivest’s Message Digest Algorithm –SHA – US Gov’t Message Digest Algorithm

Digital Signatures Computing a signature block –Hash is fixed length – apply private key What the receiver gets –Use public key on signature block to get hash back –Compute the hash of document part –Do these match? Assumes E(D(x)) = x when we usually want D(E(x))=x Public key must be known by receiver somehow – certificate (b)

Distributing Public Keys Certificate authority –Trusted 3 rd party –Their public key known Send name and public key, digitally signed by CA (certificate authority)

Step 1: User Authentication Basic Principles. Authentication must identify: 1.Something the user knows 2.Something the user has 3.Something the user is This is done before user can use the system for access control

Authentication Using Passwords (a) A successful login (b) Login rejected after name entered (c) Login rejected after name and password typed

Authentication Using Passwords How a cracker broke into LBL –a U.S. Dept. of Energy research lab

Login Spoofing (a) Correct login screen (b) Phony login screen

Authentication Using Passwords The use of salt to defeat precomputation of encrypted passwords Salt Password,,,,

One-Time Passwords Using 1-way function: Function such that given formula for f(x) –easy to evaluate y = f(x) But given y –computationally infeasible to find x One-time passwords –Choose password s and integer n –1 st time P 1 =f(f(f(f(s)))), 2 nd time P 2 = f(f(f(s))), etc –Login name supplies current integer value –Server stores old password, f(newpassword)==old?

Challenge - Response Sets of question – answer pairs –Server picks one and asks –User knows answer User picks function f(x) –Server sends a value for x –User sends back f(x) as password Using symmetric encryption –Server sends random value r –User encrypts with secret key – e(r,k) Server compares

Authentication Using a Physical Object Magnetic cards –magnetic stripe cards –chip cards: stored value cards, smart cards

Authentication Using Biometrics A device for measuring finger length. Retinal scans Voice recognition

Countermeasures Limiting times when someone can log in Automatic callback at number prespecified Limited number of login tries A database of all logins Simple login name/password as a trap –security personnel notified when attacker bites

Step 2: Access Control Mechanisms Protection Domains Examples of three protection domains

The Access Model Authorization problems can be represented abstractly by use of an access model. –each row represents a subject/principal/domain –each column represents an object –each cell: accesses permitted for the {subject, object} pair read, write, delete, execute, search, control, or any other method In real systems, the access matrix is sparse and dynamic. need a flexible, efficient representation

26 Access Control Matrix Processes execute in a protection domain, initially inherited from subject (user running the process) TA grp Terry Lynn gradefile solutions proj1 rwx rw r rx luvltr r rw hotgossip rw

27 Two Representations ACL - Access Control Lists –Columns of previous matrix –Permissions attached to Objects –ACL for file hotgossip: Terry, rw; Lynn, rw Capabilities –Rows of previous matrix –Permissions associated with Subject –Tickets, Namespace (what it is that one can name) –Capabilities held by Lynn: luvltr, rw; hotgossip,rw

Protection Domains A protection matrix

Protection Domains A protection matrix with domains as objects

File Access Control Access control lists - detailed list attached to file of users allowed (denied) access, including kind of access allowed/denied. UNIX RWX - owner, group, everyone Capabilities – permitted accesses associated with subject (user), similar to an address space. –Un-forgeable object reference, like a pointer.

Trusted Systems Trusted Computing Base A reference monitor

Access Control Lists Approach: represent the access matrix by storing its columns with the objects. Tag each object with an access control list (ACL) of authorized subjects/principals. To authorize an access requested by S for O –search O’s ACL for an entry matching S –compare requested access with permitted access –access checks are often made only at bind time

Access Control Lists Use of access control lists of manage file access

Access Control Lists Two access control lists

UNIX access control Each file carries its access control with it. rwx rwx rwx setuid Owner UID Group GID Everybody elseWhen bit set, it allows process executing object to assume UID of owner temporarily - enter owner domain (rights amplification) Owner has chmod, chgrp rights (granting, revoking)

Capabilities Approach: represent the access matrix by storing its rows with the subjects. Tag each subject with a list of capabilities for the objects it is permitted to access. –A capability is an unforgeable object reference, like a pointer. –It endows the holder with permission to operate on the object e.g., permission to invoke specific methods –Typically, capabilities may be passed from one subject to another. Rights propagation and confinement problems

Capabilities Each process has a capability list

Cryptographically-protected capability Generic Rights 1.Copy capability 2.Copy object 3.Remove capability 4.Destroy object Capabilities ServerObjectRightsf(Objects, Rights, Check)

Calling Mechanism Assume a capability to execute a procedure (lpr) Parameter is a capability to an object of mine (read access to file foo) lpr’s c-list has a template capability for the parameter, requires that certain rights are passed in (if lpr can’t read the file foo, it obviously can’t do its job) Sometimes, need rights amplification to do the job.

Dynamics of Protection Schemes How to endow software modules with appropriate privilege? –What mechanism exists to bind principals with subjects? e.g., setuid syscall, setuid bit –What principals should a software module bind to? privilege of creator: but may not be sufficient to perform the service privilege of owner or system: dangerous

Dynamics of Protection Schemes Problems: Mutual Suspicion When a caller requests a service, the callee should be limited in what stuff of the caller’s it has access to (only what it is passed). (entering domain - setuid vs. passing in single object) Modification When caller does pass an object as parameter, we want to control whether the callee can modify it (I send you a photo, you remove my copyright mark) Conservation When caller passes an object to gain service, we want to know that the callee doesn’t retain or even pass on the right to the object after we think they are done with it. (our credit card number – and selling such databases) Confinement We want to prevent information leaks (besides the objects themselves)

42 Dynamics of Protection Schemes How to revoke privileges? What about adding new subjects or new objects? How to dynamically change the set of objects accessible (or vulnerable) to different processes run by the same user? –Need-to-know principle / Principle of minimal privilege –How do subjects change identity to execute a more privileged module? protection domain, protection domain switch (enter)

43 Protection Domains Processes execute in a protection domain, initially inherited from subject Goal: to be able to change protection domains Introduce a level of indirection Domains become protected objects with operations defined on them: owner, copy, control TA grp Terry Lynn gradefile solutions proj1 rwx rwrwo r rxc luvltr r rw hotgossip rw Domain0 ctl enter r

44 If domain contains copy on right to some object, then it can transfer that right to the object to another domain. If domain is owner of some object, it can grant that right to the object, with or without copy to another domain If domain is owner or has ctl right to a domain, it can remove right to object from that domain Rights propagation. TA grp Terry Lynn gradefile solutions proj1 rwx rwrwo r rxc luvltr r rw hotgossip rw Domain0 ctl enter r rcrc r

Dynamics of Protection Schemes Problems: Mutual Suspicion enter my domain vs. me, as owner, granting right to another domain (temp) Modification rights for particular operations Conservation ctl – being able to revoke rights; not granting copy rights Confinement remove rights to write or create anything else?

Multilevel Security The Bell-La Padula multilevel security model

Multilevel Security The Biba Model Principles to guarantee integrity of data 1.Simple integrity principle process can write only objects at its security level or lower 2.The integrity * property process can read only objects at its security level or higher

NTFS File Encryption Operation of the encrypting file system K retrieved user's public key