File System Security Jason Eick and Evan Nelson. What does a file system do? A file system is a method for storing and organizing computer files and the.

Slides:



Advertisements
Similar presentations
CS 346 – April 4 Mass storage –Disk formatting –Managing swap space –RAID Commitment –Please finish chapter 12.
Advertisements

Section 6.2. Record data by magnetizing the binary code on the surface of a disk. Data area is reusable Allows for both sequential and direct access file.
Linux Installation LINUX INSTALLATION. Download LINUX Linux Installation To install Red Hat, you will need to download the ISO images (CD Images) of the.
Drives, Directories and Files. A computer file is a block of arbitrary information, or resource for storing information. Computer files can be considered.
Database Administration and Security Transparencies 1.
File Management Lecture 3.
Microsoft Windows NT File System (NTFS) “Providing a false sense of file security for Windows users since 1993”
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
Allocation Methods - Contiguous
Windows XP File System Management Group D. 3 Layers of Drivers Filter Drivers Filter Drivers –Virus protection, compression, encryption File System Drivers.
Chapter 13 – File and Database Systems
Ayşegül AYHAN & Can KOÇOĞLU Operating Systems’ File Systems.
Connecting with Computer Science, 2e
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
1 File Management in Representative Operating Systems.
CHAPTER Network Reliability: Fault Tolerance and Other Issues.
Chapter 12 File Management Systems
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
I/O Systems and Storage Systems May 22, 2000 Instructor: Gary Kimura.
Operating Systems.
CSE 451: Operating Systems Winter 2010 Module 13 Redundant Arrays of Inexpensive Disks (RAID) and OS structure Mark Zbikowski Gary Kimura.
Hard Drive Formatting 1. Formatting Once a hard drive has been partitioned, there’s one more step you must perform before your OS can use that drive:
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
MCSE Guide to Microsoft Windows 7 Chapter 5 Managing File Systems.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Chapter 7 Working with Files.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
CS 352 : Computer Organization and Design University of Wisconsin-Eau Claire Dan Ernst Storage Systems.
Redundant Array of Independent Disks
Objectives Learn what a file system does
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Mastering Windows Network Forensics and Investigation Chapter 7: Windows File Systems.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
INFO1 – Practical problem solving in the digital world
Window NT File System JianJing Cao (#98284).
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Data and its manifestations. Storage and Retrieval techniques.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
File System Management File system management encompasses the provision of a way to store your data in a computer, as well as a way for you to find and.
Managing Disks and Drives Chapter 13 powered by dj.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
MCSE GUIDE TO MICROSOFT WINDOWS 7 Chapter 5 Managing File Systems.
Chapter 3 Partitioning Drives using NTFS and FAT32 Prepared by: Khurram N. Shamsi.
Windows Server 2003 硬碟管理與磁碟機陣列 林寶森
Windows Vista Inside Out Chapter 28 - Chapter 28 - Managing Disks and Drives Last modified
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
MCSE Guide to Microsoft Windows Vista Professional Chapter 5 Managing File Systems.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Lecture 18 Windows – NT File System (NTFS)
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
FAT File Allocation Table
MCSE GUIDE TO MICROSOFT WINDOWS 7 Chapter 5 Managing File Systems.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Chapter 3: Windows7 Part 3.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
File-System Management
Unit OS8: File System 8.6. Quiz
File Management.
RAID RAID Mukesh N Tekwani
File Managements.
Operating System Module 1: Linux Installation
RAID RAID Mukesh N Tekwani April 23, 2019
Presentation transcript:

File System Security Jason Eick and Evan Nelson

What does a file system do? A file system is a method for storing and organizing computer files and the data they contain to make it easy to find and access them. A file system is a method for storing and organizing computer files and the data they contain to make it easy to find and access them. File systems exist on hard drives, pen drives, cd’s, dvd’s and any other form of data storage medium File systems exist on hard drives, pen drives, cd’s, dvd’s and any other form of data storage medium Most data storage devices have array of fixed-size blocks, sometimes called sectors, and file system is in charge of organizing these sectors into files and directories. It is also in charge of indexing the media so it knows where and what each file is Most data storage devices have array of fixed-size blocks, sometimes called sectors, and file system is in charge of organizing these sectors into files and directories. It is also in charge of indexing the media so it knows where and what each file is

Types of File Systems Disk file systems – FAT (File Allocation Table), NTFS, HFS (Hierarchical File System), ext2, ext3, ISO9660 and UDF Disk file systems – FAT (File Allocation Table), NTFS, HFS (Hierarchical File System), ext2, ext3, ISO9660 and UDF FAT(FAT12, FAT16, FAT32), and especially NTFS are primarily used on Windows operating systems. FAT is also the standard file system for floppy drives and is still used today FAT(FAT12, FAT16, FAT32), and especially NTFS are primarily used on Windows operating systems. FAT is also the standard file system for floppy drives and is still used today HFS is used by Mac OS, and ext2, ext3 are used on various linux operating systems HFS is used by Mac OS, and ext2, ext3 are used on various linux operating systems ISO9660 and UDF are used on optical media ISO9660 and UDF are used on optical media

How does the file system handle security? The file system is crucial to data integrity. The file system is crucial to data integrity. Main method of protection is through access control Main method of protection is through access control Accessing file system operations (ex. modifying or deleting a file) are controlled through access control lists or capabilities Accessing file system operations (ex. modifying or deleting a file) are controlled through access control lists or capabilities Capabilities are more secure so they tend to be used by operating systems on file systems like NTFS or ext3. Capabilities are more secure so they tend to be used by operating systems on file systems like NTFS or ext3. Secondary method of protection is through the use of backup and recovery systems Secondary method of protection is through the use of backup and recovery systems

Attacks on the file system Race Condition Attacks Race Condition Attacks Using ADS to hide files Using ADS to hide files Directory traversal Directory traversal

Race Condition Attacks Occurs when a process performs a sequence of operations on a file, under the assumption that they are executed atomically. Occurs when a process performs a sequence of operations on a file, under the assumption that they are executed atomically. Can be used by the attacker to change the characteristics of that file between two successive operations on it resulting in the victim process to operate on the modified file. Can be used by the attacker to change the characteristics of that file between two successive operations on it resulting in the victim process to operate on the modified file.

Using ADS to hide Files Alternate Data Streams(ADS) allows multiple data streams to be attached to a single file. Alternate Data Streams(ADS) allows multiple data streams to be attached to a single file. A file can be hidden behind a file as an attached stream that could be hundreds of megabytes in size, however a directory listing will only display the file’s normal size. A file can be hidden behind a file as an attached stream that could be hundreds of megabytes in size, however a directory listing will only display the file’s normal size.

Directory Traversal An exploit caused by lack of insufficient security validation of user supplied input file names An exploit caused by lack of insufficient security validation of user supplied input file names For example the attacker would pass this as input.../../../../../../../../../etc/password to retrieve the password file from the server. For example the attacker would pass this as input.../../../../../../../../../etc/password to retrieve the password file from the server.

How does the file system ensure data integrity? There are various methods of protecting the files on a file system. There are various methods of protecting the files on a file system. Access Controls Access Controls Encryption Encryption RAID RAID Recovery when data is corrupted Recovery when data is corrupted

Access Control Access Control plays a huge part in file system security Access Control plays a huge part in file system security The system should only allow access to files that the user is permitted to access The system should only allow access to files that the user is permitted to access Almost all major file systems support ACL’s or capabilities in order to prevent malicious activity on the file system Almost all major file systems support ACL’s or capabilities in order to prevent malicious activity on the file system Depending on the users rights they can be allowed to read, write and/or execute and object. In some file systems schemes only certain users are allowed to alter the ACL on a file or see if a file even exists. Depending on the users rights they can be allowed to read, write and/or execute and object. In some file systems schemes only certain users are allowed to alter the ACL on a file or see if a file even exists. Ultimately the less the user has access to the less that can go wrong and the integrity of the disk can be more guaranteed. Ultimately the less the user has access to the less that can go wrong and the integrity of the disk can be more guaranteed.

General File System Encryption Encryption is also a method used by file systems to secure data, NTFS for example offers file encryption using DESX Encryption is also a method used by file systems to secure data, NTFS for example offers file encryption using DESX Two method of disk encryption Two method of disk encryption Full Disk Encryption Full Disk Encryption File System Encryption File System Encryption File system encryption has a few advantages over full disk encryption for example File system encryption has a few advantages over full disk encryption for example 1. File based key management 2. Individual management of encrypted files 3. Access control can be further strengthened through the use of public key cryptography 4. Keys are only held in memory while the file is being used

Encrypting File System(EFS) Provides security beyond user authentication and access control lists. For example when the attacker has physical access to the computer. Provides security beyond user authentication and access control lists. For example when the attacker has physical access to the computer. EFS uses public key cryptography however it is susceptible to brute-force attacks against the user account passwords. EFS uses public key cryptography however it is susceptible to brute-force attacks against the user account passwords.

EFS Encryption EFS works by encrypting a file with a bulk symmetric key, aka File Encryption Key or FEK. EFS works by encrypting a file with a bulk symmetric key, aka File Encryption Key or FEK. The FEK is encrypted with a public key that is associated with the user that encrypted the file. The FEK is encrypted with a public key that is associated with the user that encrypted the file.

EFS Encryption

EFS Decryption The EFS uses the private key that matches the EFS digital certificate (that was used to encrypt the file) to decrypt the symmetric key. The EFS uses the private key that matches the EFS digital certificate (that was used to encrypt the file) to decrypt the symmetric key. The resulting symmetric key is then used to decrypt the file. The resulting symmetric key is then used to decrypt the file.

EFS Decryption

RAID RAID stands for Redundant Array of Independent Disks RAID stands for Redundant Array of Independent Disks Offers drawbacks and advantages over a single disk, each with different applications Offers drawbacks and advantages over a single disk, each with different applications Types of RAID Types of RAID RAID 0 “Striping set without parity” RAID 0 “Striping set without parity” RAID 1 “Mirrored set without parity” RAID 1 “Mirrored set without parity” RAID 3 “Striped set with byte level parity” RAID 3 “Striped set with byte level parity” RAID 4 “Striped set with block level parity” RAID 4 “Striped set with block level parity” RAID 5 “Striped set with distributed parity” RAID 5 “Striped set with distributed parity” RAID 6 “Striped set with dual distributed parity” RAID 6 “Striped set with dual distributed parity”

RAID 0

RAID 1

RAID 3

RAID 4

RAID 5

RAID 6

What happens when something is corrupted? Checksum codes Checksum codes Reed Soloman Codes (cd’s to fix errors caused by scratches) Reed Soloman Codes (cd’s to fix errors caused by scratches) Given the right type of RAID, the system can recover easily. Given the right type of RAID, the system can recover easily. Parity Schemes Parity Schemes Protection against individual drive failure Protection against individual drive failure

File System Security’s Future Example: Sun’s ZFS Example: Sun’s ZFS Released in 2006 Released in 2006 Marked a departure from file systems of previous years by integrating new methods of storage, access and security Marked a departure from file systems of previous years by integrating new methods of storage, access and security Has two advantages in computer security compared with other file systems Has two advantages in computer security compared with other file systems Copy-on-write technology Copy-on-write technology Self Healing File system Self Healing File system