You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/228409741

Issues of Operating Systems Security

Article · January 2007

CITATIONS READS
0 19,867

2 authors, including:

Razvan Daniel Zota


Bucharest Academy of Economic Studies
65 PUBLICATIONS 243 CITATIONS

SEE PROFILE

All content following this page was uploaded by Razvan Daniel Zota on 08 September 2014.

The user has requested enhancement of the downloaded file.


ECAI 2007 - International Conference – Second Edition
Electronics, Computers and Artificial Intelligence
29th – 30th June, 2007, Piteşti , ROMÂNIA

Issues of Operating Systems Security


CONSTANTINESCU Radu, ZOTA Razvan Daniel
Academy of Economic Studies Bucharest
Piata Romana 6, sector 1, Bucharest
{radu.constantinescu, zota}@ase.ro

operating systems, security, assets, trust

Abstract. Computers are an integral part of the economic, social,


professional and governmental infrastructures. They have become necessities
in virtually every area of modern life, but their vulnerabilities are of
increasing concern. Computer-based systems are constantly under threats of
inadvertent errors and acts of nature, as well as those attributable to
unethical, immoral and criminal activities. This paper resumes the most
important concepts of security in operating systems.

INTRODUCTION process calls a server process to perform


some task on data. The server is to be
In general, the concern of security in protected against the client discovering the
operating systems is with the problem of controlling algorithm by which it performs the task,
access to computer systems and the information while the client is to be protected against the
stored in them. There have been identified four server's retaining any information about the
types of overall protection policies of increasing task being performed.
order of difficulty [3]: 4. Controlled information dissemination: In
1. No sharing: processes are completely some systems, security classes are defined
isolated from each other, and each process to enforce a particular dissemination policy.
has exclusive control over the resources Users and applications are given security
statically or dynamically assigned to it. In clearances of a certain level, while data and
this case, processes often share a program or other resources are given security
data file by making a copy of it and classifications. The security policy enforces
transferring the copy into their own virtual restrictions concerning which users have
memory. access to which classifications. This model
2. Sharing originals of program or data files: is useful not only in the military context but
with the use of reentrant code, a single in commercial applications as well.
physical realization of a program can appear
in multiple virtual address spaces, as can The work in security and protection as it
read-only data files. To prevent relates to operating systems can be grouped into
simultaneous users from interfering with three categories.
each other, special locking mechanisms are 1. Access control: concerned with regulating
required for the sharing of writable data user access to the total system, sub systems,
files. and data, and regulating process access to
3. Confined, or memory-less, subsystems: In various resources and objects within the
this case, processes are grouped into system.
subsystems to enforce a particular
protection policy. For example, a client
2 CONSTANTINESCU Radu, ZOTA Razvan Daniel

2. Information flow control: regulates the flow The proliferation of personal computers and
of data within the system and its delivery to workstations and the increasing use of local area
users. networks increase the potential for losses in this
3. Certification: relates to proving that access area. Physical and administrative security measures
and flow control mechanisms per form are needed to deal with these threats.
according to their specifications and that
they enforce desired protection and security Software
policies.
The operating system, utilities, and
application programs are what make computer
1. REQUIREMENTS FOR system hardware useful to businesses and
OPERATING SYSTEM individuals. Several distinct threats need to be
SECURITY considered. A key threat to software is an attack on
availability. Software, especially application
An understanding the types of threats to OS software, is surprisingly easy to delete. Software
security that exist requires a definition of security also can be altered or damaged to render it useless.
requirements. OS security addresses four Careful software configuration management, which
includes making backups of the most recent version
requirements:
of software, can maintain high availability. A more
1. Confidentiality: requires that the
difficult problem to deal with is software
information in a computer system be
modification that results in a program that still
accessible only for reading by authorized
functions but that behaves differently than before. A
parties. This type of access includes
final problem is software secrecy.
printing, displaying, and other forms of
disclosure, including simply revealing the
Data
existence of an object.
2. Integrity: requires that only authorized Hardware and software security are
parties can modify computer system assets. typically concerns of computing center
Modification includes writing, changing, professionals or individual concerns of personal
changing status, deleting, and creating. computer users. A much more widespread problem
3. Availability: requires that computer system is data security, which involves files and other
assets are available to authorized parties. forms of data controlled by individuals, groups, and
4. Authenticity: requires that a computer business organizations.
system be able to verify the identity of a Security concerns with respect to data are
user. broad, encompassing availability, secrecy, and
integrity. In the case of availability, the concern is
with the destruction of data files, which can occur
2. COMPUTER SYSTEM ASSETS either accidentally or maliciously.
The obvious concern with secrecy, of course,
The assets of a computer system can be is the unauthorized reading of data files or
categorized as hardware, software, and data. We databases, and this area has been the subject of
will consider each of these in turn. perhaps more research and effort than any other area
of computer security. A less obvious secrecy threat
involves the analysis of data and manifests itself in
Hardware the use of statistical databases, which provide
summary or aggregate information. As a first
The main threat to computer system impression, the existence of aggregate information
hardware is in the area of availability. Hardware is does not threaten the privacy of the individuals
the most vulnerable to attack and the least amenable involved, but as the use of statistical databases
to automated controls. Threats include accidental grows, there is an increasing potential for disclosure
and deliberate damage to equipment as well as theft. of personal information. In essence, characteristics
Issues of Operating Systems Security 3

of constituent individuals may be identified through


careful analysis. To take a simple example, if one 4. PROTECTION MECHANISMS
table records the aggregate of the incomes of
respondents X, Y, Z, and W and another records the The introduction of multiprogramming brought
aggregate of the incomes of X, Y, Z, W, and K, the about the ability to share resources among users.
difference between the two aggregates would be the This sharing involves not just the processor but also
income of K. Finally, data integrity is a major the following:
concern in most installations. Modifications to data 1. Memory
files can have consequences ranging from minor to 2. I/O devices, such as disks and printers
disastrous.
3. Programs
4. Data
3. DESIGN PRINCIPLES
The ability to share these resources introduced
the need for protection. Pfleeger points out that an
Saltzer identifies a number of principles for the
OS may offer protection along the following
design of security measures for the various threats to
spectrum:
computer systems. These include:
1. No protection: This is appropriate when
1. Least privilege: Every program and
sensitive procedures are being run at
every user of the system should operate
separate times.
using the least set of privileges
2. Isolation: This approach implies that each
necessary to complete the job. Access
process operates separately from other
rights should be acquired by explicit
processes, with no sharing or
permission only; the default should be
communication. Each process has its own
"no access."
address space, files, and other objects.
2. Economy of mechanisms: Security
3. Share all or share nothing: The owner of an
mechanisms should be as small and
object (e.g., a file or memory segment)
simple as possible, aiding in their
declares it to be public or private. In the
verification. This usually means that
former case, any process may access the
they must be an integral part of the
object; in the latter, only the owner's
design rather than add-on mechanisms
processes may access the object.
to existing designs.
4. Share via access limitation: The OS checks
3. Acceptability: Security mechanisms
the permissibility of each access by a
should not interfere unduly with the
specific user to a specific object. The OS
work of users, while at the same time
therefore acts as a guard, or gatekeeper,
should meet the needs of those who
between users and objects, ensuring that
authorize access. If the mechanisms are
only authorized accesses occur.
not easy to use, they are likely to be
unused or incorrectly used. 5. Share via dynamic capabilities: This extends
the concept of access control to allow
4. Complete mediation: Every access must
dynamic creation of sharing rights for
be checked against the access-control
objects.
information, including those accesses
occurring outside normal operation, as 6. Limit use of an object: This form of
in recovery or maintenance. protection limits not just access to an object
but the use to which that object may be put.
For example, a user may be allowed to view
Open design: The security of the system
a sensitive document but not print it.
should not depend on keeping the design of its
Another example is that a user may be
mechanisms secret. Thus, many experts can review
allowed access to a database to derive
the mechanisms, and users can have high confidence
statistical summaries but not to determine
in them.
specific data values.
4 CONSTANTINESCU Radu, ZOTA Razvan Daniel

The preceding items are listed roughly in increasing come sensitive financial and personnel data,
order of difficulty to implement, but also in accessible only by administration personnel,
increasing order of fineness of protection that they corporate officers, and so on.
provide. A given OS may provide different degrees When multiple categories or levels of data
of protection for different objects, users, or are defined, the requirement is referred to as
applications. multilevel security. The general statement of the
The OS needs to balance the need to allow requirement for multilevel security is that a subject
sharing, which enhances the utility of the computer at a high level may not convey information to a
system, with the need to protect the resources of subject at a lower or non-comparable level unless
individual users. This section considers some of the that flow accurately reflects the will of an
mechanisms by which OSs have enforced authorized user. For implementation purposes, this
protections for these objects. requirement is in two parts and is simply stated. A
multilevel secure system must enforce:
• No read up: A subject can only read
5. TRUSTED SYSTEMS an object of less or equal security
level. This is referred to as the
Another widely applicable requirement is to simple security property.
protect data or resources on the basis of levels of • No write down: A subject can only
security. This is found in the military, where write into an object of greater or
information is categorized as unclassified (U), equal security level. This is referred
confidential (C), secret (S), top secret (TS), or to as the * star property.
beyond. This concept is equally applicable in other
areas, where information can be organized into If properly enforced, these two rules provide
gross categories and users can be granted clearances multilevel security. For a data processing system,
to access certain categories of data. For example, the the approach that has been taken, and has been the
highest level of security might be for strategic object of much research and development, is based
corporate planning documents and data, accessible on the reference monitor concept.
by only corporate officers and their staff; next might

Security kernel
database

Subjects Reference monitor Objects

Audit File

Fig. 1. Reference monitor

The reference monitor, as shown in Figure access of subjects to objects on the basis of security
1, is a controlling element in the hardware and parameters of the subject and object. The reference
operating system of a computer that regulates the monitor has access to a file, known as the security
Issues of Operating Systems Security 5

kernel database, which lists the access privileges and authorized changes to the security kernel
(security clearance) of each subject and the database, are stored in the audit file.
protection attributes (classification level) of each
object. The reference monitor enforces the security
rules (no read up, no write down) and has the CONCLUSIONS
following properties [3]:
• Complete mediation: the security rules In this paper we listed the primitive security
are enforced on every access, not just, services that are provided in general by operating
for example, when a file is opened. systems. The services are: memory protection, file
• Isolation: the reference monitor and protection, general object access protection and user
database are protected from authentication. If those services are provided in a
unauthorized modification. consistent and efficient way, the system in
• Verifiability: the reference monitor's considered being trusted which means that the
correctness must be provable. That is, it system meets the security requirements, is of high
must be possible to demonstrate enough quality and justifies the user’s confidence in
mathematically that the reference that quality. [2] The underpinnings of a trusted
monitor enforces the security rules and operating system are: policy, model, design and
provides complete mediation and trust. The policies are determined by the
isolation. requirements, the model is the representation of the
policies and design represents the means of
The requirement for complete mediation implementing the system. Trust is rooted by the fact
means that every access to data within main that the operating systems have all the needed
memory and on disk and tape must be mediated. functionality to enforce the security policies and by
Pure software implementations impose too high a the fact that the operating system will enforce the
performance penalty to be practical; the solution security policies correctly and effectively.
must be at least partly in hardware. The requirement
for isolation means that it must not be possible for
an attacker to change the logic of the reference REFERENCES
monitor or the contents of the security kernel
database. Finally, the requirement for mathematical [1]. Bishop, M. - Computer Security Art and Science,
proof is formidable for something as complex as a Ed. Addison-Wesley, 2003
general-purpose computer. A system that can [2]. Pfleeger, C. - Security in Computing, Ed. Prentice
provide such verification is referred to as a trusted Hall, 2003
system. A final element is an audit file. Important [3]. Tipton, H., Krause, M. - Information Security
security events, such as detected security violations Management - Handbook 4th edition, Ed.
Auerbach, 2002;

View publication stats

You might also like