CSCD 303 Essential Computer Security Spring 2013 Lecture 8 - Desktop Security OS Security Compared Reading: See References.

Slides:



Advertisements
Similar presentations
Operating-System Structures
Advertisements

What is an operating system? Is it software?
Objectives Overview Define an operating system
SC ICT Certification Level 1 02 Operating Systems By Ross Parker.
Upgrading Software CIT 1100 Chapter4.
Chapter One The Essence of UNIX.
CSCD 303 Essential Computer Security Fall 2010 Lecture 4 - Desktop Security Reading:
Understanding Operating Systems 1 Overview Introduction Operating System Components Machine Hardware Types of Operating Systems Brief History of Operating.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Guide To UNIX Using Linux Third Edition
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Based on material from Computer Security, by Stallings and Brown
Operating Systems & File Management. What is an operating system?
Unix Presentation. What is an Operating System An operating system (OS) is a program that allows you to interact with the computer -- all of the software.
Operating System.
SOFTWARE.
Chapter 3  Manage the computer’s resources ◦ CPU ◦ Memory ◦ Disk drives ◦ Printers  Establish a user interface  Execute and provide services for applications.
Network and Active Directory Performance Monitoring and Troubleshooting NETW4008 Lecture 8.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
Lesson 6 Operating Systems and Software
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
The Basics  Operating systems (OS) can help computer users do many things, like managing and manipulating files and folders.  Operating systems also.
Computer and Information Science Computer Software Computer Software Chapter 1.2.
Agenda Last class: Computer Hardware Today: –Typing for 10 minutes –Computer Software –Journal 2 homework.
Explain the purpose of an operating system
Operating Systems Programs for performing surgery NOT! –Sorry I got carried away.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
Chapter 5: Defining the Role of the Operating System
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
CSCD 303 Essential Computer Security Spring 2013 Lecture 8 - Desktop Security OS Security Compared Reading: See References.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
* Property of STI Page 1 of 18 Software: Systems and Applications Basic Computer Concepts Software  Software: can be divided into:  systems software.
Operating System What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware. An operating.
Computer Operating Systems Unit 1 – BTA 3O Chytra.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Computer Literacy for IC 3 Unit 1: Computing Fundamentals © 2010 Pearson Education, Inc. | Publishing as Prentice Hall.1 Chapter 5: Identifying Operating.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Application Software System Software.
Lecture 2 Page 1 CS 236 Online Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Writing Security Alerts tbird Last modified 2/25/2016 8:55 PM.
Lecture9 Page 1 CS 236 Online Operating System Security, Con’t CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
보안 취약점 비교 Linux vs. Windows
Operating System & Application Software
Operating System Security
Lecture 1-Part 2: Operating-System Structures
Lab 05 Firewalls.
Unit 2 Computer Systems Operating Systems Windows MAC & Linux.
LINUX WINDOWS Vs..
Outline What does the OS protect? Authentication for operating systems
Introduction to Operating System (OS)
Outline What does the OS protect? Authentication for operating systems
LINUX WINDOWS Vs..
Files, folders, directories, URLs, and IP addresses
What is an Operating System?
Booting Up 15-Nov-18 boot.ppt.
Chapter 2: System Structures
Lecture 1-Part 2: Operating-System Structures
Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Introducing Windows Operating Systems
Presentation transcript:

CSCD 303 Essential Computer Security Spring 2013 Lecture 8 - Desktop Security OS Security Compared Reading: See References

Overview Briefly, Overview of Linux Security OS Vulnerabilities Linux Windows Max OS X

Linux Security Model Linux’s traditional security model is – People or processes with “root” privileges can do anything – Other accounts can do much less Hence attacker’s goal – Get root privileges !!!!

File System Security In Linux everything is a file I/O to devices is via a special file – Example: /dev/cdrom allows access to the cdrom drive which is a special file Have other special files like named pipes – A conduit between processes / programs Since almost everything is a file – security very important

Users and Groups Users and Groups are not files Users – Someone or something capable of using files – Can be human or process – e.g. lpd (Linux Printer Daemon) runs as user lp Groups – List of user accounts – User’s main group membership specified in /etc/passwd – User can be added to additional group by editing /etc/group – Command line -> useradd, usermod, and userdel

User's details are kept in /etc/password maestro:x:200:100:Maestro Edward Hizzersands:/home/maestro:/bin/bash x in password file means password is stored in the shadow file Entry in /etc/shadow password file maestro:$1$fnfffc$pGteyHdicpGOfffXX4ow# 5:13064:0:99999:7::: Additional group details in /etc/group conductors:x:100: pianists:x:102:maestro,volodya Users and Groups

File Permissions Files have two owners: a user & a group – Each with its own set of permissions – With a third set of permissions for other Permissions are to read/write/execute in order user/group/other rw-rw -r-- 1 maestro user Mar 25 01:38 baton.txt Permission can be changed using chmod command

8 8 ACL:Default Permission and Abbreviation Example: UNIX  Three classes of users: owner, group, all others

Directory Permissions Permissions on folder slightly works different – read = list contents – write = create or delete files in directory – execute = use anything in or change working directory to this directory drwxr-x--- 8 biff drummers 288 Mar 25 01:38 extreme_casseroles

Comparing Operating Systems Researchers have spent a lot of time studying vulnerabilities in operating systems Which is better? Linux vs. Windows vs. Mac? Who has the fewest serious vulnerabilities? Other metric used -- how many successful attacks on a particular OS

Windows Design Flaws/Poor Design Decisions Windows has evolved from a single-user design to a multi-user model few years back Windows is monolithic, not modular, by design Windows depends too heavily on an RPC model Windows focuses on its familiar graphical desktop interface

Windows Evolved from Single-User Design to multi-user model Windows has long been hampered by its origin as Single-user system – Windows originally designed to allow both users and applications free access to entire system, which means anyone could tamper with a critical system program or file Windows XP was the first version of Windows to reflect a serious effort to isolate users from the system, Users each have their own private files and limited system privileges – This caused many legacy Windows applications to fail – Solution: Windows XP includes a compatibility mode - a mode that allows programs to operate as if they were running in the original insecure single-user design

Linux Based on Multi-User Design Linux does not have a history of being a single-user system – Has been designed from ground-up to isolate users from applications, files and directories that affect entire operating system Each user is given a user directory All of user’s data files and configuration files are stored – When a user runs an application, such as a word processor, that word processor runs with restricted privileges of the user

National Vulnerability Database Classifies and organizes reported vulnerabilities for various software programs and systems Mitre has the contract to maintain this database You can search this database for all the vulnerabilities associated with a system

Evaluation: Windows Vs. Linux Vulnerabilities The United States Computer Emergency Readiness Team (CERT) uses its own set of metrics to evaluate severity of any given security flaw Query CERT vulnerabilities notes database for “Windows” and “Linux” keywords to examine metrics for 40 most recent reported vulnerabilities A number between 0 and 180 expresses final metric, where number 180 represents the most serious vulnerability The ranking is not linear – In other words, a vulnerability ranked 100 is not twice as serious as a vulnerability ranked at 50 CERT considers any vulnerability with a score of 40 or higher to be serious enough to be a candidate for a special CERT Advisory and US-CERT technical alert

National Vulnerability Database Classifies and organizes reported vulnerabilities for various software programs and systems Mitre has the contract to maintain this database

CERT: Query Result for Keyword “Microsoft”

CERT: Query Result for Keyword “Microsoft” (continued)

CERT: Query Result for Keyword “Linux”

CERT: Query Result for Keyword “Linux” (continued)

CERT: Evaluation of Query Results for Microsoft and Linux CERT web search capabilities do not produce perfectly desirable results in terms of granularity or longevity – Especially True for Linux The “Linux” search results include a number of Oracle security vulnerabilities that are common to Linux, UNIX, and Windows – In Top 40 CERT results for “Microsoft”, Top entry containing the severity metric of 78 5 entries have a severity rating of 40 or greater – In Top 40 CERT results for Linux Top entry containing the severity metric of None other entry have a severity rating 27 or greater

Vulnerabilities Recent years, lots of comparisons – 2007 brought improved security with Windows Vista and Mac OS X Leopard – Compiled security flaws in Mac OS X and Windows XP and Vista and placed them side by side – Vulnerability statistics from third party vendor Secunia and broke them down by Windows XP flaws, Vista flaws, and Mac OS X flaws

Table of Flaws Windows vs. Mac Windows XP, Vista, and Mac OS X vulnerability stats for 2007 XP Vista XP + Vista Mac OS X Total extremely critical Total highly critical Total moderately critical Total less critical Total flaws Average flaws/month

Analysis of Data Apple had more than 5 times number of flaws per month than Windows XP and Vista in 2007 – Most of these flaws were serious – This seems to go against conventional wisdom Noteworthy... – Windows Vista showed fewer flaws than Windows XP, Windows Defender and Sidebar added 4 highly critical flaws to Vista that weren’t present in Windows XP

Update - Pwn2Own 2009 Want to guess the results of 2009? – Charlie Miller has done it again – 2nd consecutive year, security researcher hacked into a fully patched MacBook computer by exploiting a security vulnerability in Apple’s Safari browser – Miller launched his drive-by attack and claimed the $10,000 top prize. He also got to keep the MacBook machine – Miller said he came to the CanSecWest security conference with a plan to hack into Safari and had tested the exploit carefully to ensure “it worked the first time.” falls-in-seconds/2917 Current results

Microsoft Vulnerabilities September 2009 For past six months, over 90% of the attacks recorded for Microsoft targeted the buffer overflow vulnerability described in the Microsoft Security Bulletin MS08-067

References The Register Security Report: Linux vs. Windows nux/#execsummary y_showdown_mac_os_v Security vulnerability showdown, Mac vs. Linux vs. Ubuntu erability_showdown_mac_os_v IBM report: Vulnerabilities still going unpatched Mac versus Windows vulnerability stats for

The End