The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.

Slides:



Advertisements
Similar presentations
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
Chapter 9: Privacy, Crime, and Security
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Networks IGCSE ICT Section 4.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Chapter 11 Security. 2 The Security Problem Security must consider internal and external environment of the system, and protect it from: – unauthorized.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Operating system Security By Murtaza K. Madraswala.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
CSCE 201 Identification and Authentication Fall 2015.
Cybersecurity Test Review Introduction to Digital Technology.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Precautions Computing Science.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Technical Implementation: Security Risks
8 – Protecting Data and Security
Security Protecting information data confidentiality
Chapter 40 Internet Security.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Operating Systems Services provided on internet
Chapter 15: Security.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Lecture 5. Security Threats
Network security threats
Operating system Security
OPERATING SYSTEMS CS 3502 Fall 2017
Answer the questions to reveal the blocks and guess the picture.
Firewalls.
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
– Communication Technology in a Changing World
12: Security The Security Problem Authentication Program Threats
Chap 10 Malicious Software.
ISNE101 Dr. Ken Cosh Week 13.
Faculty of Science IT Department By Raz Dara MA.
Security.
Chap 10 Malicious Software.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Operating System Concepts
Computer Security.
Erica Burch Jesse Forrest
Operating System Concepts
Presentation transcript:

The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction accidental introduction of inconsistency. Easier to protect against accidental than malicious misuse.

Security A system is secure if its resources are used and accessed as intended under all circumstances.

Java Security Model

What is Security? All Security is based on the answers to the questions. Who do you trust? How much do you trust them? The answers to these questions form a Security Policy

What is System Security? Computer Security commonly refers to the mechanisms available to enforce the Security Policy

Security Components Physical Security

Obviously, if your computer is stolen, you have no security Physical Security Obviously, if your computer is stolen, you have no security

Physical Security WiFi – defined network Bluetooth– ad-hoc network

Security Components Physical Security Authentication

Authentication Verify that someone is who they say they are Two general methods Data item you know (e.g. password) Data media you have (e.g. card)

Authentication Problems with Passwords User selects System selects Dictionary Attack System selects May not be easily guessed, but… User can’t remember it and… Writes it on a post-it note

Authentication Problems with data media you have Can be lost or stolen Can be forged

Authentication Combination of both Examples ATM card requires a PIN SecurID card requires PIN

Authentication Biometrics Data item you have that most likely cannot be lost or stolen Examples Fingerprint Retinal Scan Facial Recognition Voice Recognition

Security Components Physical Security Authentication Protection

Protection Mechanisms to control what an authenticated user can do. File Protection Memory Protection Web Protection

Protection Mechanism to keep unauthorized users from accessing the system Firewalls Virus Detection Spyware Detection

Security Components Physical Security Authentication Protection Encryption

Encryption Scrambles data so that eavesdroppers cannot read what is being transmitted Also used as part of Authentication to help ensure that someone is not posing as somebody else

Security Components Physical Security Authentication Protection Encryption People

People Lack of knowledge about security People will not keep data secure. People can be conned into giving out information they shouldn’t Poor System Administration

Types of Attacks Trojan Horse Trap Door Stack & Buffer Overflow Worm Virus Denial of Service

Trojan Horse Program that appears to be a legitimate agent or process but really behaves in a different manner Viruses and Spyware are often introduced as Trojan Horses

Trap Door A way to bypass the normal security protections Often left in applications / systems to help support staff

Stack & Buffer Overflow Send an incorrectly formatted command / message to a system. If system does not carry out adequate checking, it may execute some action it shouldn’t

Stack & Buffer Overflow How does this happen? Poorly Programmed Read Should be read(file,buffer,100) Instead of read(file,buffer) which reads as much data as the remote system sends Inadequate checking of the validity of the data that is received

Stack & Buffer Overflow Security Design Rule Assume any data you receive is incorrectly formatted (Until proven otherwise)

SQL Injection Application does inadequate validation of user input before putting it into an SQL statement Example SELECT BALANCE FROM ACCTS WHERE ACCT_ID=xxxx User Input for xxxx 104;UPDATE ACCTS SET BALANCE=100000 WHERE ACCT_ID=104

Worm A program that automatically sends itself to another system

Virus Program that attacks a system to carry out some action the computer user does not want

Denial of Service Typical attack sends so many messages to a system, that system cannot execute anything except respond to those messages

Modern Attacks A modern attack will often employ several combinations of these attacks

Example Attack I Kournikova Virus Enticed people to open an email attachment Attachment was a virus that used mail program’s address book to propagate itself

Example Attack II Windows XP Universal Plug n Play Upnp is a feature of Win XP that is intended to allow people to control their (future) internet connected home appliances from any computer Early Flaw: Buffer Overflow problem

Example Attack II Windows XP Universal Plug n Play XP was touted as MS’s most secure OS Reality: ALL XP systems were vulnerable to be hacked

Example Attack III Wireless LAN Laptop Office Network

Example Attack III IEEE 802.11 Wireless LAN Marketed as having Wired Equivalent Privacy Uses Encryption to keep data private Flaw: Bad Encryption Result: one can monitor traffic for about a day and then easily break into the network Several apps available on web for executing this hack

Example Attack IV

Example Attack IV Distributed Denial of Service Attack Hacker compromised several computers Programmed each of those systems to repeatedly send messages to “target” Hacker shutdown many popular websites

Problem Set The following topics are also important Types of attacks Virtual Memory 8/9/2018 Problem Set The following topics are also important Types of attacks Protection policies and mechanisms Encryption, digital signature, PKI, digital certificate Authentication What are the advantages of encrypting data stored in the computer system? Compare symmetric and asymmetric encryption schemes, and discuss under what circumstances a distributed system would use one or the other. J Garrido

Virtual Memory 8/9/2018 Problem Set Discuss how the asymmetric encryption algorithm can be used to achieve the following goals. Authentication: the receiver knows that only the sender could have generated the message Secrecy: only the receiver can decrypt the message Authentication and Secrecy: only the receiver can decrypt the message, and the receiver knows that only the sender could have generated the message J Garrido