Chapter 09
Chapter 09
Security
1
The Security Environment
Threats
2
Intruders
Common Categories
2. Casual prying by nontechnical users
3. Snooping by insiders
4. Determined attempt to make money
5. Commercial or military espionage
3
Accidental Data Loss
Common Causes
2. Acts of God
- fires, floods, wars
3. Hardware or software errors
- CPU malfunction, bad disk, program bugs
4. Human errors
- data entry, wrong tape mounted
4
Basics of Cryptography
5
Secret-Key Cryptography
• Monoalphabetic substitution
– each letter replaced by different letter
6
Public-Key Cryptography
7
One-Way Functions
8
Digital Signatures
(b)
10
Authentication Using Passwords
,
,
,
,
Salt Password
• Magnetic cards
– magnetic stripe cards
– chip cards: stored value cards, smart cards 14
Authentication Using Biometrics
16
Operating System Security
Trojan Horses
17
Login Spoofing
19
Trap Doors
22
Famous Security Flaws
26
How Viruses Work (1)
27
How Viruses Work (2)
Recursive
procedure
that finds
executable
files on a
UNIX
system
Virus could
infect them all
28
How Viruses Work (3)
• An executable program
• With a virus at the front
• With the virus at the end
• With a virus spread over free space within program
29
How Viruses Work (4)
31
Antivirus and Anti-Antivirus Techniques
(a) A program
(b) Infected program
(c) Compressed infected program
(d) Encrypted virus
(e) Compressed virus with encrypted compression code
32
Antivirus and Anti-Antivirus Techniques
• Integrity checkers
• Behavioral checkers
• Virus avoidance
– good OS
– install only shrink-wrapped software
– use antivirus software
– do not click on attachments to email
– frequent backups
• Recovery from virus attack
– halt computer, reboot from safe disk, run antivirus
34
The Internet Worm
35
Mobile Code (1) Sandboxing
37
Mobile Code (3)
38
Java Security (1)
• Checks include …
1. Attempts to forge pointers
2. Violation of access restrictions on private class
members
3. Misuse of variables by type
4. Generation of stack over/underflows
5. Illegal conversion of variables to another type
39
Java Security (2)
40
Protection Mechanisms
Protection Domains (1)
41
Protection Domains (2)
A protection matrix
42
Protection Domains (3)
45
Capabilities (1)
• Generic Rights
1. Copy capability
2. Copy object
3. Remove capability
4. Destroy object
47
Trusted Systems
Trusted Computing Base
A reference monitor
48
Formal Models of Secure Systems
51
Orange Book Security (1)
53
Covert Channels (1)
54
Covert Channels (2)
55
Covert Channels (3)
• Pictures appear the same
• Picture on right has text of 5 Shakespeare plays
– encrypted, inserted into low order bits of color values