30/04/2015Tim S Roberts 20081 COIT13152 Operating Systems T1, 2008 Tim S Roberts.

Slides:



Advertisements
Similar presentations
Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Advertisements

Data and Computer Communications
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Chapter 18: Computer and Network Security Threats
Chapter 9: Privacy, Crime, and Security
Chapter 14 Computer Security Threats
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Security Requirements
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Security Chapter 15. Computer and Network Security Requirements Confidentiality –Requires information in a computer system only be accessible for reading.
Lecture 15 Overview. Kinds of Malicious Codes Virus: a program that attaches copies of itself into other programs. – Propagates and performs some unwanted.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Operating Systems Protection & Security.
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
Chapter 18 Intruders.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Protection & Security Introduction to Operating Systems: Module 16.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CSCE 522 Lecture 12 Program Security Malicious Code.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Security CS Introduction to Operating Systems.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Information Security in Distributed Systems Distributed Systems1.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Chap1: Is there a Security Problem in Computing?.
Malicious Software.
Chapter 9 Intruders.
1 Security in Computing Module 1 Introduction. What Is Security? “The quality or state of being secure—to be free from danger” 2.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
1 Security Chapter Information Assurance and Security Confidentiality  Not available or visible to unauthorized parties Integrity  Only modifiable.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Chapter 9 Intruders.
Viruses and Other Malicious Content
Chap 10 Malicious Software.
Chapter 9 Intruders.
Security.
Chap 10 Malicious Software.
Security network management
Operating System Concepts
Chapter 9 Intruders and Viruses.
Presentation transcript:

30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts

30/04/2015Tim S Roberts Protection & Security A whole course is available - COIT13211 Information Security

Protection 30/04/2015Tim S Roberts 20083

Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique name and can be accessed through a well-defined set of operations. Protection problem - ensure that each object is accessed correctly and only by those processes that are allowed to do so. 30/04/2015Tim S Roberts 20084

Principles of Protection Guiding principle – principle of least privilege  Programs, users and systems should be given just enough privileges to perform their tasks 30/04/2015Tim S Roberts 20085

Domain Structure Access-right = where rights-set is a subset of all valid operations that can be performed on the object. 30/04/2015Tim S Roberts 20086

30/04/2015Tim S Roberts Access Matrix Subject  An entity capable of accessing objects Object  Anything to which access is controlled Access rights  The way in which an object is accessed by a subject

30/04/2015Tim S Roberts Access Matrix

30/04/2015Tim S Roberts Access Matrix with domains as objects

Security 30/04/2015Tim S Roberts

30/04/2015Tim S Roberts Security Requirements Confidentiality Integrity Availability Authenticity

30/04/2015Tim S Roberts Security Requirements Confidentiality  Requires information in a computer system only be accessible for reading by authorized parties

30/04/2015Tim S Roberts Security Requirements Integrity  Assets can be modified by authorized parties only

30/04/2015Tim S Roberts Security Requirements Availability  Assets be available to authorized parties

30/04/2015Tim S Roberts Security Requirements Authenticity  Requires that a computer system be able to verify the identity of a user

30/04/2015Tim S Roberts Types of Threats Interruption Interception Modification Fabrication

30/04/2015Tim S Roberts Types of Threats Interruption  An asset of the system is destroyed of becomes unavailable or unusable  Attack on availability  Destruction of hardware  Cutting of a communication line  Disabling the file management system

30/04/2015Tim S Roberts Types of Threats Interception  An unauthorized party gains access to an asset  Attack on confidentiality  Wiretapping to capture data in a network  Illicit copying of files or programs

30/04/2015Tim S Roberts Types of Threats Modification  An unauthorized party not only gains access but tampers with an asset  Attack on integrity  Changing values in a data file  Altering a program so that it performs differently  Modifying the content of messages being transmitted in a network

30/04/2015Tim S Roberts Types of Threats Fabrication  An unauthorized party inserts counterfeit objects into the system  Attack on authenticity  Insertion of spurious messages in a network  Addition of records to a file

30/04/2015Tim S Roberts Computer System Assets Hardware  Threats include accidental and deliberate damage Software  Threats include deletion, alteration, damage  Backups of the most recent versions can maintain high availability

30/04/2015Tim S Roberts Computer System Assets Data  Involves files  Security concerns for availability, secrecy, and integrity

30/04/2015Tim S Roberts User-Oriented Access Control Log on  Requires both a user identifier (ID) and a password  System only allows users to log on if the ID is known to the system and password associated with the ID is correct  Users can reveal their password to others either intentionally or accidentally  Hackers are skillful at guessing passwords

30/04/2015Tim S Roberts Data-Oriented Access Control Associated with each user, there can be a user profile that specifies permissible operations and file accesses Operating system enforces these rules Database management system controls access to specific records or portions of records

30/04/2015Tim S Roberts ID Provides Security Determines whether the user is authorized to gain access to a system Determines the privileges accorded to the user  Guest or anonymous accounts have mover limited privileges than others ID is used for discretionary access control  A user may grant permission to files to others by ID

30/04/2015Tim S Roberts Techniques for Learning Passwords Try default password used with standard accounts shipped with computer Exhaustively try all short passwords Try words in dictionary or a list of likely passwords Collect information about users and use these items as passwords

30/04/2015Tim S Roberts Techniques for Learning Passwords Try user’s phone numbers, social security numbers, and room numbers Try all legitimate license plate numbers for this state Use a Trojan horse to bypass restrictions on access Tap the line between a remote user and the host system

30/04/2015Tim S Roberts Password Selection Strategies Computer generated passwords  Users have difficulty remembering them  Need to write it down  Have history of poor acceptance

30/04/2015Tim S Roberts Password Selection Strategies Reactive password checking strategy  System periodically runs its own password cracker to find guessable passwords  System cancels passwords that are guessed and notifies user  Consumes resources to do this  Hacker can use this on their own machine with a copy of the password file

30/04/2015Tim S Roberts Password Selection Strategies Proactive password checker  The system checks at the time of selection if the password is allowable  With guidance from the system users can select memorable passwords that are difficult to guess

30/04/2015Tim S Roberts Intrusion Detection Assume the behavior of the intruder differs from the legitimate user Statistical anomaly detection  Collect data related to the behavior of legitimate users over a period of time  Statistical tests are used to determine if the behavior is not legitimate behavior

30/04/2015Tim S Roberts Intrusion Detection Rule-based detection  Rules are developed to detect deviation form previous usage pattern  Expert system searches for suspicious behavior

30/04/2015Tim S Roberts Intrusion Detection Audit record  Native audit records  All operating systems include accounting software that collects information on user activity  Detection-specific audit records  Collection facility can be implemented that generates audit records containing only that information required by the intrusion detection system

30/04/2015Tim S Roberts Malicious Programs Those that need a host program  Fragments of programs that cannot exist independently of some application program, utility, or system program Independent  Self-contained programs that can be scheduled and run by the operating system

30/04/2015Tim S Roberts Trapdoor Entry point into a program that allows someone who is aware of trapdoor to gain access used by programmers to debug and test programs  Avoids necessary setup and authentication  Method to activate program if something wrong with authentication procedure

30/04/2015Tim S Roberts Logic Bomb Code embedded in a legitimate program that is set to “explode” when certain conditions are met  Presence or absence of certain files  Particular day of the week  Particular user running application

30/04/2015Tim S Roberts Trojan Horse Useful program that contains hidden code that when invoked performs some unwanted or harmful function Can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly  User may set file permission so everyone has

30/04/2015Tim S Roberts Viruses Program that can “infect” other programs by modifying them  Modification includes copy of virus program  The infected program can infect other programs

30/04/2015Tim S Roberts Worms Use network connections to spread form system to system Electronic mail facility  A worm mails a copy of itself to other systems Remote execution capability  A worm executes a copy of itself on another system Remote log-in capability  A worm logs on to a remote system as a user and then uses commands to copy itself from one system to the other

30/04/2015Tim S Roberts Zombie Program that secretly takes over another Internet-attached computer It uses that computer to launch attacks that are difficult to trace to the zombie’s creator

30/04/2015Tim S Roberts Virus Stages Dormant phase  Virus is idle Propagation phase  Virus places an identical copy of itself into other programs or into certain system areas on the disk

30/04/2015Tim S Roberts Virus Stages Triggering phase  Virus is activated to perform the function for which it was intended  Caused by a variety of system events Execution phase  Function is performed

30/04/2015Tim S Roberts Types of Viruses Parasitic  Attaches itself to executable files and replicates  When the infected program is executed, it looks for other executables to infect Memory-resident  Lodges in main memory as part of a resident system program  Once in memory, it infects every program that executes

30/04/2015Tim S Roberts Types of Viruses Boot sector  Infects boot record  Spreads when system is booted from the disk containing the virus Stealth  Designed to hide itself form detection by antivirus software  May use compression

30/04/2015Tim S Roberts Types of Viruses Polymorphic  Mutates with every infection, making detection by the “signature” of the virus impossible  Mutation engine creates a random encryption key to encrypt the remainder of the virus  The key is stored with the virus

30/04/2015Tim S Roberts Antivirus Approaches Detection Identification Removal

30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts