Linux-vs-Windows Security

Slides:



Advertisements
Similar presentations
Operating Systems Manage system resources –CPU scheduling –Process management –Memory management –Input/Output device management –Storage device management.
Advertisements

Database Administration and Security Transparencies 1.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Cryptography and Network Security Chapter 1
Chapter 6 User Protections in OS. csci5233 computer security & integrity (Chap. 6) 2 Outline User-level protections 1.Memory protection 2.Control of access.
1 Network Security Ola Flygt Växjö University
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 6 Module 6 Security in Operating Systems  MModified by :Ahmad Al Ghoul  PPhiladelphia.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
File Management Systems
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
SE571 Security in Computing
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
An Introduction to Operating Systems. Definition  An Operating System, or OS, is low-level software that enables a user and higher-level application.
Operating System.
Week 6 Operating Systems.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Systems Security & Audit Operating Systems security.
What does “secure” mean? Protecting Valuables
G53SEC 1 Reference Monitors Enforcement of Access Control.
Lecture 16 Overview.
Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.
Security in Operating Systems Cuiwei Zhao. Security in Operating System §Security breaches §Security goals §Protected objects of the general purpose operating.
Chapter 4 – Protection in General Purpose Operating Systems  Protection features provided by general-purpose operating systems— protecting memory, files,
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
G53SEC 1 Reference Monitors Enforcement of Access Control.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Security in Computing Protection in General-Purpose Operating Systems.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Wireless and Mobile Security
Securing the Linux Operating System Erik P. Friebolin.
Computer Security By Duncan Hall.
Lecture 17 Overview. Targeted Malicious Code Trapdoor – undocumented entry point to a module – forget to remove them – intentionally leave them in the.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
SECURITY IN COMPUTING BY PFLEEGER Operating Systems Security.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Computer Security: Chapter 5 Operating Systems Security.
6- 1 Last time ● Controls against security flaws in programs ● Various controls applicable to each of the stages in the software development lifecycle.
Operating System Security
Chapter 6 – Users, Groups, and Permissions
Data and database administration
Secure Software Confidentiality Integrity Data Security Authentication
Computer Data Security & Privacy
Operating System 2 Overview
CS 450/650 Fundamentals of Integrated Computer Security
What is an Operating System?
Operating Systems Security
INFORMATION SYSTEMS SECURITY and CONTROL
Operating System Security
Operating System 2 Overview
Network Security Ola Flygt Växjö University
Security network management
PLANNING A SECURE BASELINE INSTALLATION
O.S. Security.
Operating System 2 Overview
Presentation transcript:

Linux-vs-Windows Security Operating System Security Linux-vs-Windows Security Erik P. Friebolin

Security in Operating Systems Security Breaches Security Goals Protected Objects of the general purpose OS Protection of Objects

Security Breaches Exposure Vulnerability Threats A form of possible loss or harm in a computing system. Vulnerability Weakness that might be exploited to cause loss or harm. Threats Circumstances that have the potential to cause loss or harm.

Types of Threats Interruption Interception Modification Fabrication

Security Goals Confidentiality Integrity Availability The assets of a computing system are accessible only by authorized parties. Integrity Assets can be modified only by authorized parties or only in authorized ways. Availability Assets are accessible to authorized parties.

Protection in General-Purpose OS Protected Objects and Methods Protecting Memory and Addressing Protecting Access to General Objects File Protection Mechanisms User Authentication

Protected Objects and Methods Memory Sharable I/O devices, such as disks Serially reusable I/O devices, such as printers Sharable programs and sub-programs Sharable data

Protected Objects and Methods Security Methods Seperation: keeping one user’s objects separate from other users’ Physical Seperation Temporal Seperation Logical Seperation Cryptographic Seperation Granularity of Control The larger the level of the object controlled, the easier it is to implement access control.

Protecting Memory and Addressing Fence Relocation Base/Bounds Registers Tagged Architecture Segmentation Paging

Protecting Access to General Objects Memory A file or data on an auxiliary storage device An executing program in memory A directory of files A hardware device A table of the operating system Passwords A data structure, such as a stack

Protecting Access to General Objects Directory OS maintains all directories. Each user has a list(directory) that contains all the objects that user is allowed to access. Access Control List Each object has an ACL. This list shows all subjects who should have access to the object and what the access is.

File Protection Mechanisms Basic Forms of Protection All-None Protection Group Protecton Single Permission Password or other token Temporary Acquired Permission

User Authentication Use of Passwords Attacks on Passwords Password Selection Criteria The Authentication Process

Linux Operating System An OS initially created by Linus Torvolds (Finland) and a team working over the Internet. Developed from MINIX, a small Unix system An open and free operating system, adaptable to meet individual nees.

Windows Operating System Developed by Microsoft Corporation Windows OS first introduced in 1983 Windows 3.1 sold +10million copies – best selling GUI in computing history. The most widely used GUI in the world today.

Linux Security Advantages Disadvantages Security has had years to be tested and verified Security is tied to a file Ability to merge systems/domains Firewall functionality built-in to server Disadvantages Limited file access control Security not as strict No Auditing

Windows Security Advantages Disadvantages Stricter security available Greater control of access permissions. Auditing of security events Disadvantages Security still in infancy Most widely used software

QUESTIONS?

References D. Denning, P. Denning, Certification of Programs for Secure Information Flow, CommACM, V20 N7, Jul 1977, pp. 504-513 J. Linn, Practical Authentication for Distributed Computing, Proc IEEE symp Security & Privacy, IEEE Comp Soc Press 1990, pp. 31-40 C.P. Pfleeger, Security in Computing, Prentice Hall, NJ, 1996 “The Great Linux-vs-NT Debate”, http://www.linux-tutorial.info/Linux-NT_Debate, accessed 7/12/02