Chapter 6 Security and Protection
Chapter 6 Security and Protection
Department of
Computer Science
OPERATING SYSTEM
COSC 3023
3
7.1. Overview of system security
† If a computer program is run by unauthorized user then
he/she may cause severe damage to computer or data stored
in it.
† So a computer system must be protected against
unauthorized access, malicious access to system memory,
viruses, worms etc.
Traditionally, computer facilities have been physically
protected for three reasons:
To prevent theft of or damage to the hardware
7
Security measure levels
Impossible to have absolute security, but make cost to
perpetrator sufficiently high to deter most intruder.
Security must occur at four level to be effective.
Physical
Data centers, servers, connected terminals
Human
Avoid social engineering, phishing, dumpster diving
Operating system
Protection mechanisms, debugging
Network
Intercepted communications, interruption, DOS
8
7.1.1. Policies and mechanism of
system security
Policies => what
9
Components of security
1. Authentication
† Authentication refers to identifying each user of the
system and associating the executing programs with
those users.
11
3. User attribute - fingerprint/ eye retina pattern/
signature - User need to pass his/her attribute via
designated input device used by operating system to
login into the system.
2. Confidentiality
• Specifies that only the sender and the intended
recipient should be able to access the content of the
message.
12
3. Access control:- Access control specifies and control who
can access what.
13
One Time passwords
• One time passwords provides additional security along
with normal authentication.
• In One-Time Password system, a unique password is
required every time user tries to login into the system.
• Once a one-time password is used then it can not be
used again. One time password are implemented in
various ways.
1. Random numbers - Users are provided cards having
numbers printed along with corresponding alphabets.
System asks for numbers corresponding to few
alphabets randomly chosen.
14
One Time passwords
19
System Threats
• Worm -Worm is a process which can choked down a system
performance by using system resources to extreme levels.
• A Worm process generates its multiple copies where each
copy uses system resources, prevents all other processes to
get required resources.
• Worms processes can even shut down an entire network.
• Port Scanning - Port scanning is a mechanism or means by
which a hacker can detects system vulnerabilities to make an
attack on the system.
• Denial of Service - Denial of service attacks normally
prevents user to make legitimate use of the system. For
example user may not be able to use internet if denial of
service attacks browser's content settings.
20
Computer Security Classifications
• As per the U.S. Department of Defense Trusted
Computer System's Evaluation Criteria there are
four security classifications in computer systems: A,
B, C, and D.
• This is widely used specifications to determine and
model the security of systems and of security
solutions.
• Following is the brief description of each
classification.
21
Computer Security Classifications
22
OS for system security
† A typical commodity operating system has complete control of
all (or almost all) hardware on the machine and is able to do
literally anything the hardware permits.
† That means it can control the processor, read and write all
registers, examine any main memory location, and perform any
operation one of its peripherals supports.
23
OS for system security
• Examine or alter any process’s memory
25
2. Secure our computer
• Activate our firewall
• Firewalls are the first line of cyber defense; they
block connections to unknown or bogus sites and
will keep out some types of viruses and hackers.
• Use anti-virus/malware software Prevent viruses
from infecting our computer by installing and
regularly updating anti-virus software.
• Block spyware attacks Prevent spyware from
infiltrating our computer by installing and updating
anti-spyware software.
26
3. Be Social-Media Savvy
Make sure your social networking profiles (e.g. Facebook,
Twitter, Youtube, MSN, etc.) are set to private.
5. Install the latest operating system
• Enables
Confirmation of source
29
Encryption
• Constrains the set of possible receivers of a message
• Encryption algorithm consists of
Set K of keys
Set M of messages
Set C of ciphertexts (encrypted messages)
• A function E: K->(M->C). That is, for each k£K,Ek
is a function for generating ciphertexts from
messages.
• A function D: K->(C->M). That is, for each
k£K,Dk is a function for generating messages from
ciphertexts.
30
Asymmetric encryption
• Public-key encryption based on each user having
two keys:
Public key – public key used to encrypt data.
31
Firewalling
• This is a software used to protect computer systems
and networks.
• A network firewale is placed between trusted and
untrusted hosts.
• The firewale limits network access between these
two security domains.
• Can be tunneled or spooled
Tunneling allows disallowed protocol to travel within
allowed protocol (telnet inside of HTTP).
Firewall rules typically based on host name or IP address
which can be spooled.
32
Firewalling
33
!!!
SI X
E R
P T
H A
F C
D O
EN
34