Operating system Part four Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.

Slides:



Advertisements
Similar presentations
Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Advertisements

CSC 360- Instructor: K. Wu Overview of Operating Systems.
An investigation into the security features of Oracle 10g R2 Enterprise Edition Supervisor: Mr J Ebden.
Chapter 2 Operating System Overview Operating Systems: Internals and Design Principles, 6/E William Stallings.
CS 101 – Oct. 26 Operating Systems (Chapter 10) –Ultimate program –Intimate with the hardware –Responsibilities… –Examples.
Using Nagios for Intrusion detection Miguel Cárdenas Montes Elio Pérez Calle Francisco Javier Rodríguez Calonge.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Lecture 1: History of Operating System
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
© 2004, D. J. Foreman 1 O/S Organization. © 2004, D. J. Foreman 2 Topics  Basic functions of an OS ■ Dev mgmt ■ Process & resource mgmt ■ Memory mgmt.
Operating Systems: Software in the Background
Operating Systems CS208. What is Operating System? It is a program. It is the first piece of software to run after the system boots. It coordinates the.
Operating system Part three Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
Operating system Structure and Operation
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Operating Systems Computer Science: An Overview Tenth Edition.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Introduction to Operating Systems
Data Storage Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information Technology Islamic.
Operating system Part two Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
Netwrok and the internet Part two Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
Network and the internet Part four Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Operating Systems  By the end of this session, you will know: What an Operating System is. The functions it performs.
What does “secure” mean? Protecting Valuables
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Copyright © 2012 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Operating Systems Computer Science: An Overview Eleventh Edition.
CS 1308 Computer Literacy and the Internet. Introduction  Von Neumann computer  “Naked machine”  Hardware without any helpful user-oriented features.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Operating Systems Computer Science: An Overview Tenth Edition.
Operating system Security By Murtaza K. Madraswala.
Chapter 3 Operating Systems © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 3: Operating Systems
Chapter 2 Securing Network Server and User Workstations.
Operating System Principles And Multitasking
Operating System Structure A key concept of operating systems is multiprogramming. –Goal of multiprogramming is to efficiently utilize all of the computing.
1 Computer Systems II Introduction to Processes. 2 First Two Major Computer System Evolution Steps Led to the idea of multiprogramming (multiple concurrent.
Operating systems Part one Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
Data Manipulation, part two Introduction to computer, 2 nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
Chapter 3 Operating Systems. © 2005 Pearson Addison-Wesley. All rights reserved 3-2 Chapter 3 Operating Systems 3.1 The Evolution of Operating Systems.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Introduction to Operating Systems
Chapter 3: Operating Systems
An Introduction to Operating Systems
Operating system Security
Introduction to Operating System (OS)
IS310 Hardware & Network Infrastructure Ronny L
Introduction to Operating Systems
What is an Operating System?
OPERATING SYSTEM OVERVIEW
OPERATING SYSTEMS.
Chapter 15, Exploring the Digital Domain
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Security.
Unit 1: Introduction to Operating System
Functions of an operating system
Chapter 1 Introduction(1.1)
Chapter 3 Operating Systems
Chapter 3: Operating Systems
Coordinating the Machine’s Activities
Chapter 3: Operating Systems
Chapter 3: Operating Systems
Chapter 3: Operating Systems Computer Science: An Overview
Chapter 3: Operating Systems
Computer Security Damian Gordon.
Access Control and Audit
Overview of Computer system
Presentation transcript:

Operating system Part four Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information Technology Islamic University of Gaza

Security The security of a computer system requires a well-designed operating system. The security takes multiple forms; for example: reliability (no fail). If a flaw in the file manager causes the loss of part of a file, then the file was not secure.

Attacks from the outside An important task performed by operating system is to protect the computer’s resources from any unauthorized access. ◦ Establishing accounts for each user by the administrator (username, password and privileges) ◦ The OS use this information during each login procedure. ◦ The administrator(highly privileged) is able to monitor activity within the computer system in an effort to detect destructive behavior. ◦ To assist in this; Some software (auditing software), record and then analyze the activities taking place within the computer system.  Incorrect passwords.  Sniffing software ( software that records activities and later reports them to intruder)

security One of the major obstacles to the security of computer systems is the carelessness of the users themselves. ◦ Easy to guess password ◦ Share password with friends

Attacks from within Once an intruder gain access to a computer system, the next step is to explore, looking for information or for places to insert destructive software. The intruder may try to trick the memory manager into allowing a process to access main memory cells outside its allotted area. Or may try to trick the file manager into retrieving files whose access should be denied.

security To protect against such actions, CPUs are designed to operate in one of two privilege levels: ◦ Privileged mode ◦ Non-privileged mode Privileged mode: the CPU is able to execute all the instructions in its machine language Non-privileged mode: the list of acceptable instructions is limited.

security The instructions that are available only in privileged mode are called privileged instructions. An attempt to execute a privileged instruction when the CPU is in non-privileged mode causes an interrupt. This interrupt convert the CPU to privileged mode. When first turned on, the CPU is in privileged mode. Thus, when the OS starts at the end of the boot process, all instructions are executable. However, each time the OS allows a process to start a time slice, it switches the CPU to non-privileged mode by executing a “change privilege mode” instructinos.

security Privileged instructions and the control of privilege levels is the major tools available to OS for maintaining security. A single flaw in privilege level control can open the door to disaster. If a process is allowed to alter the timer that controls the system’s multiprogramming system, that process can extend its time slice and dominate the machine. If a process is allowed to access peripheral devices directly, then it can read files without supervision by the system’s file manager. If a process is allowed to access memory cell outside its allotted area, it can read and even alter data being used by other process.