Professional Documents
Culture Documents
Lecture 6 - File Management Security
Lecture 6 - File Management Security
Roadmap
• Overview
• File organisation and Access
• File Directories
• File Sharing
• Secondary Storage Management
• File System Security
Files
• Files are the central element to most
applications
• The File System is one of the most important
part of the OS to a user
• Desirable properties of files:
– Long-term existence
– Sharable between processes
– Structure
Typical Operations
• File systems also provide functions which can
be performed on files, typically:
– Create
– Delete
– Open
– Close
– Read
– Write
Terms
• Four terms are in common use when
discussing files:
– Field
– Record
– File
– Database
Fields and Records
• A field is the basic element of data.
• It is characterized by its length and data type (e.g. ASCII string,
decimal).
• Depending on the file design, fields may be fixed length or variable
length.
• File
– Have file names
– Is a collection of similar records
– Treated as a single entity
– May implement access control mechanisms
• Database
– Collection of related data
– Relationships exist among elements
– Consists of one or more files
File
Management Systems
• Provides services to users and applications in
the use of files
– The way a user or application accesses files
• Programmer does not need to develop file
management software
Objectives for a File Management
System
• Meet the data management needs of the user
• Guarantee that the data in the file are valid
• Optimize performance
• Provide I/O support for a variety of storage device
types
• Minimize lost or destroyed data
• Provide a standardized set of I/O interface routines
to user processes
• Provide I/O support for multiple users (if needed)
Requirements for a
general purpose system
1. Each user should be able to create, delete, read, write and
modify files
2. Each user may have controlled access to other users’ files
3. Each user may control what type of accesses are allowed
to the users’ files
4. Each user should be able to restructure the user’s files in a
form appropriate to the problem
5. Each user should be able to move data between files
6. Each user should be able to back up and recover the
user’s files in case of damage
7. Each user should be able to access the user’s files by using
symbolic names
Typical software organization
Roadmap
• Overview
• File organisation and Access
• File Directories
• File Sharing
• Record Blocking
• Secondary Storage Management
• File System Security
File Organization
• File Management Referring to the logical
structure of records
– Physical organization discussed later
The file allocation table needs just a single entry for each
file, showing the starting block and the length of the
file.
External fragmentation will occur, making it difficult to find contiguous blocks of space of
sufficient length.
Each entry in the matrix indicates the access rights of that subject for that object.
Access Control Lists
• In practice, an access matrix is usually
sparse and is implemented by
decomposition in one of two ways:
• A matrix may be decomposed by columns
• Giving an Access Control List (ACL) for
each file.
• Thus for each object, an access
control list lists users and their
permitted access rights.
• The access control list may contain a
default, or public, entry.
• This allows users that are not
explicitly listed as having special rights
to have a default set of rights.
• Decomposition by
rows yields capability
lists (or ticket)
– specifies authorized
objects and
operations for a user.
Computer Security Threats
Roadmap
• Computer Security Concepts
• Threats
• Intruders
• Malicious Software Overview
• Viruses, Worms, and Bots
• Rootkits
Security definition
• The NIST Computer Security Handbook
defines computer security as:
Unauthorized Disclosure
• A circumstance or event whereby an entity gains access to data for which the
entity is not authorized.
Deception
• A circumstance or event that may result in an authorized entity receiving
false data and believing it to be true.
Disruption
• A circumstance or event that interrupts or prevents the correct operation of
system services and functions.
Usurpation
• A circumstance or event that results in control of system services or functions
by an unauthorized entity
Assets
• The assets of a computer system can be
categorized as
– hardware,
– software,
– data,
– communication lines and networks.
Scope of System Security
Assets in Relation to the CIA Triad
Roadmap
• Computer Security Concepts
• Threats
• Intruders
• Malicious Software Overview
• Viruses, Worms, and Bots
• Rootkits
Intruders
Three main classes of intruders:
1. Masquerader,
– Typically an outsider
2. Misfeasor
– Often an insider and legitimate user
3. Clandestine user
– An individual who seizes supervisory control of the
system and uses this control to evade auditing and
access controls or to suppress audit collection
Roadmap
• Computer Security Concepts
• Threats, Attacks, and Assets
• Intruders
• Malicious Software
• Viruses, Worms, and Bots
• Rootkits
Malware
• General term for any Malicious softWare
– Software designed to cause damage
– Or use up the resources of a target computer.
• Some malware are parasitic
– Contained within other software
• Some malware are self-replicating, others
require some other means to propogate.
• E.g backdoor, logic bomb, trojan horse, mobile
code
Backdoor
• Trapdoor
• Secret entry point
• Useful for programmers debugging
– But allows unscrupulous programmers to gain
unauthorized access.
Logic Bomb
• Explodes when certain conditions are met
– Presence or absence of certain files
– Particular day of the week
– Particular user running application
Trojan Horse
• Useful program that contains hidden code
that when invoked performs some unwanted
or harmful function
• Can be used to accomplish functions indirectly
that an unauthorized user could not
accomplish directly
– User may set file permission so everyone has
access
Mobile Code
• Transmitted from remote system to local
system
• Executed on local system without the user’s
explicit instruction
• Common example is cross-site scripting
attacks
Roadmap
• Computer Security Concepts
• Threats, Attacks, and Assets
• Intruders
• Malicious Software Overview
• Viruses, Worms, and Bots
• Rootkits
Parts of Virus
• Software that “infects” other software by
modifying them
• Modification includes
– An infection mechanism
– Trigger
– Payload
Virus Stages
• During its lifetime, a typical virus goes through
the following four phases:
– Dormant phase
– Propagation phase
– Triggering phase
– Execution phase
70
Worms
• Replicates itself
• Use network connections to spread form
system to system
• Email virus has elements of being a worm (self
replicating)
– But normally requires some intervention to run,
so classed as a virus rather than worm
71
Worm Propogation
• Electronic mail facility
– A worm mails a copy of itself to other systems
• Remote execution capability
– A worm executes a copy of itself on another
system
• Remote log-in capability
– A worm logs on to a remote system as a user and
then uses commands to copy itself from one
system to the other
Bots
• From Robot
– Also called Zombie or drone
• Program secretly takes of another Internet-
attached computer
• Launch attacks that are difficult to trace to
bot’s creator
• Collection of bots is a botnet
Multiple-Threat Malware
• Multipartite virus infects in multiple ways
• Blended attack uses multiple methods
• Ex: Nimda has worm, virus, and mobile code
characteristics
Roadmap
• Computer Security Concepts
• Threats, Attacks, and Assets
• Intruders
• Malicious Software Overview
• Viruses, Worms, and Bots
• Rootkits
Rootkit
• Set of programs installed on a system to
maintain administrator (or root) access to that
system
• Hides its existence
• With root access, Attacker has complete
control of the system.
Rootkit installation
• Often as a trojan
– Commonly attached to pirated software
• Installed manually after a hacker has gained root
access
• Rootkits can be classified based on whether they
can survive a reboot and execution mode.
– Persistent
– Memory based
– User mode
– Kernel mode
Computer Security Protection
Techniques
Roadmap
• Authentication
• Access Control
• Intrusion Detection
• Malware Defense
Authentication
• Basis for most type of access control and
accountability
• Two steps
– Identification
– Verification
Means of Authentication
• Traditionally listed as three factors
• Something you know
– Password, PIN
• Something you have
– Card, RFID badge
• Something you are
– Static Biometrics: Fingerprint, face
– Dynamic Biometrics: handwriting, voice
recognition, typing rhythm
Password-Based
Authentication
• Determines if user is authorized to access the
system
• Determines privileges for the user
• Discretionary access control may be applied
Hashed Passwords
When a file containing a polymorphic virus is executed, the virus must decrypt itself to activate.
To detect such a structure, executable files are run through a GD scanner, which contains the
following elements:
CPU emulator:
• A software-based virtual computer.
• Instructions in an executable file are interpreted by the emulator rather than executed on
the underlying processor.
• The emulator includes software versions of all registers and other processor hardware, so
that the underlying processor is unaffected by programs interpreted on the emulator.