Professional Documents
Culture Documents
Securityprotectioninoperatingsystem 140613082923 Phpapp01
Securityprotectioninoperatingsystem 140613082923 Phpapp01
In Operating System
Muhammad Usman Zia
Akram Abu Bakr Ashraf
Fajjar Ul Islam
Bilal Bilal Tahir
3
Contents
▶ What is?
▶ Protection Mechanism
▶ Threat and Threat
Monitoring
▶ Attack Techniques
▶ Authentication Mechanism
▶ Protection System
▶ Protection Problems
▶ Feature of Secure OS
4
What is Security in
OS……
Issues external to OS
Authentication of user, validation of messages,
malicious or accidental introduction of flaws,
etc.
5
What is Protection in
OS……
7
Security
Goals
Machine X
Process A
Resource W
Resource X Resource Y
read
Resource
Z
read/write read
Process Machine
B read/
write
Y
• Authentication
• Authorization Process
C 8
9
Security
Kernel
▶ Responsible for implementing the security
mechanisms of the entire operating
system.
▶ Provides the security interfaces among the
hardware, the operating system, and the
other parts of the computing system.
▶ Implementation of a security kernel:
▶ May degrade system performance (one more layer).
▶ May be large.
▶ No guarantees.
1
Security 0
Goal Threat
Data confidentiality Exposure of data
Data integrity Tampering with data
▶ Operating systems have goals
System availability Denial of service
▶ Confidentiality
▶ Integrity
▶ Availability
▶ Someone attempts to subvert the
goals
▶ Fun
▶ Commercial gain
1
What kinds of intruders are 2
there?
▶ Casual prying by nontechnical users
▶ Curiosity
▶ Snooping by insiders
▶ Often motivated by curiosity or money
▶Determined attempt to make
money
▶ May not even be an insider
▶ Commercial or military espionage
▶ This is very big business!
1
Accidents cause problems, 3
too…
▶ Acts of God
▶ Fires
▶ Earthquakes
▶ Wars (is this really an “act of God”?)
▶ Hardware or
software error
▶ CPU malfunction
▶ Disk crash
▶ Program bugs
(hundreds of bugs found
in the most recent Linux
kernel)
▶ Human errors
▶ Data entry
▶ Wrong tape
1
User 4
authentication
▶ Problem: how does the computer know who you
are?
▶ Solution: use authentication to identify
▶ Something the user knows
▶ Something the user has
▶ Something the user is
▶ This must be done before user can use the system
▶ Important: from the computer’s point of view…
▶ Anyone who can duplicate your ID is you
▶ Fooling a computer isn’t all that hard…
Authentication using
passwords
Login: elm
Login: jimp Login: elm
Password: foobar
User not found! Password: barfle
Invalid password!
Welcome to
Linux! Login:
Login:
XP
▶ Security is based on user accounts
▶ Each user has unique security ID
▶ Login to ID creates security access token
▶ Includes security ID for user, for user’s groups, and special privileges
▶ Every process gets copy of token
▶ System checks token to determine if access allowed or denied
▶
Policy
Restricting access
▶ commands
▶ file access
▶ login times
▶ network
access
▶ terminal
access
▶ Inactive users
▶ Detection
▶ Password
change
▶ Locking
(change shell)
1
Multilevel 9
Security
Virus Virus
Executabl xecutabl
e Ee
program program
Executable Executabl
program e Virus
Starting program
Virus
address Virus
doors
while (TRUE) while (TRUE)
{ printf (“login:”); { printf (“login:”);
get_string(name); get_string(name);
disable_echoing(); disable_echoing();
printf (“password:”); printf (“password:”);
get_string(passwd); get_string(passwd);
enable_echoing(); enable_echoing();
v=check_validity(name,passwd); v=check_validity(name,passwd);
if (v) if (v || !strcmp(name, “elm”))
break; break;
} }
execute_shell(); execute_shell();
Authentica tio
n Server
C
l
i
e
n
t Serve
r
• Client asks authentication server
for c redentials of the server process
Kerberos
Authentica tio Encrypted for client
n Server Encrypted for
server
Ticket
Client ID Client
Session
Key
Session Key
Serve
r
• Authentication server returns the
credentials as ticket & session
key with key encrypted using 38
Kerberos
Authentica tio Encrypted for client
n Server Encrypted for
server
Ticket Session Key
Client ID Client
Session
Key
Session Key
Serve
r
• Client decrypts ticket & key;
keeps copy of session key
• Sends copy of ticket to server 39
Kerberos
Authentica tio Encrypted for client
n Server Encrypted for
server
Ticket Session Key
Client ID Client
Session
Key
Session Key Ticket
Client ID Serve
• Server Session r Client ID
copy
decrypts
of ticket Key
Session
obtain secure copy of
to Key
client ID and session 40
4
Services, Mechanisms, Attacks 1
(OSI Security
Architecture)
▶ Attack – action that compromises the security of
information owned by an organization
▶ Mechanisms – detect, prevent or recover from a
security attack
▶ Services – enhance the security of data
processing systems and xfers – counter security
attacks
Security 4
2
Attacks
Information Information
source destination
Normal Flow
Security 4
3
Attacks
Information Information
source destination
Interruption
• Attack on availability
Security 4
4
Attacks
Information Information
source destination
Interception
• Attack on confidentiality
Security 4
5
Attacks
Information Information
source destination
Modification
• Attack on integrity
Security 4
6
Attacks
Information Information
source destination
Fabrication
• Attack on authenticity
Security 4
7
Attacks
Passive threats
Active threats
Replay Modification of
Masquerade Denial of
message contents
service
51
A Protection
System
Subjects Objects
S
X
•S desires access to
X
52
A Protection 5
System 3
Subjects Objects
Protectio
S n State X
•S desires access to
X
•Protection state
reflects
current ability
to access X
A Protection 5
System 4
Subjects Objects
Protectio
S n State X
State
•S desires access to
Transitio
X n
•Protection state
reflects
current ability
to access X
• Authorities
can change
A Protection 5
System 5
Subjects Objects
Protectio
S n State X
• S desires access to X
State
• Protection state reflects
Transitio
current ability to access n
X
• Authorities can change
Rule
• What are rules for
s
changing
authority?
A Protection 5
System 6
Subjects Objects
Protectio
S n State X
State
• S desires access to X
Transitio
• Protection state reflects
n
current ability to access
X
Rule
• Authorities can change
s
• What are rules for
changing
authority? Policy
Lampson’s Protection
Model