29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.

Slides:



Advertisements
Similar presentations
Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Advertisements

Lecture 6 User Authentication (cont)
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Chapter 9: Privacy, Crime, and Security
Cryptography and Network Security Chapter 20 Intruders
Chapter 14 Computer Security Threats
Security  The Security Problem  Authentication  Program Threats  System Threats  Securing Systems  Intrusion (unwanted involvement) Detection  Encryption.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security Requirements
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
CPE 5002 Network security. Look at the surroundings before you leap.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Security Chapter 15. Computer and Network Security Requirements Confidentiality –Requires information in a computer system only be accessible for reading.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Operating Systems Protection & Security.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts, Amherst Operating Systems CMPSCI 377 Lecture.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
What does “secure” mean? Protecting Valuables
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Protection & Security Introduction to Operating Systems: Module 16.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Operating Systems 1 K. Salah Module 6.0: Security and Protection  Types of misuse: –1. Accidental –2. Intentional –Protection is to prevent either accidental.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Operating system Security By Murtaza K. Madraswala.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Network security Network security. Look at the surroundings before you leap.
Security CS Introduction to Operating Systems.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Information Security in Distributed Systems Distributed Systems1.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Chap1: Is there a Security Problem in Computing?.
Malicious Software.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
1 Security Chapter Information Assurance and Security Confidentiality  Not available or visible to unauthorized parties Integrity  Only modifiable.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Operating system Security
NET 311 Information Security
12: Security The Security Problem Authentication Program Threats
Security.
Security network management
Protection and Security
Operating System Concepts
Operating System Concepts
Presentation transcript:

29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides

29.2 Security The Security Problem Authentication Program Threats

29.3 The Security Problem Security must consider external environment of the system, and protect it from: –unauthorized access. –malicious modification or destruction –accidental introduction of inconsistency. Easier to protect against accidental than malicious misuse.

29.4 Types of Threats Interruption –an asset of the system is destroyed of becomes unavailable or unusable –Examples  destruction of hardware (hard disk)  cutting of a communication line  disabling the file management system

29.5 Types of Threats Interception –an unauthorized party gains access to an asset –Examples  wiretapping to capture data in a network  illicit copying of files or programs

29.6 Types of Threats Modification –an unauthorized party not only gains access but tampers with an asset –Examples  changing values in a data file  altering a program so that it performs differently  modifying the content of messages being transmitted in a network

29.7 Types of Threats Fabrication –an unauthorized party inserts counterfeit objects into the system –Examples  insertion of spurious messages in a network  addition of records to a file

29.8 Authentication User identity most often established through passwords, can be considered a special case of either keys or capabilities. Passwords must be kept secret. –Frequent change of passwords. –Use of “non-guessable” passwords. –Log all invalid access attempts.

29.9 Techniques for Learning Passwords Try default password used with standard accounts shipped with computer Exhaustively try all short passwords Try words in dictionary or a list of likely passwords Collect information about users and use these items as passwords`4

29.10 Observed Password Lengths Length Number Fraction of Total Purdue University. 54 machines user accounts

29.11 Techniques for Learning Passwords Try user’s phone numbers, social security numbers, and room numbers Try license plate numbers Use a Trojan horse to bypass restrictions on access Tap the line between a remote user and the host system

29.12 Password Cracked from a Sample Set of 13,797 Accounts [KLEI90] Type of Password Search Number Percentage of Size of Matches Passw. Match User/account name % Common names % Female names % Phrases and patterns % System dictionary % Machine names %

29.13 Effectiveness of guessing (W. Stallings) Personal information Words from various dictionaries (60000 words) Various permutations of words from the dictionaries) Capitalization permutations Test with 3 million words Thinking Machine Time to encrypt all these words: under one hour Success rate: 25%

29.14 Password Selection Strategies Computer generated passwords –users have difficulty remembering them –need to write it down –have history of poor acceptance Eliminate guessable passwords while allowing the user to select a password that is memorable

29.15 Password Selection Strategies Reactive password checking strategy –system periodically runs its own password cracker to find guessable passwords –system cancels passwords that are guessed and notifies user –consumes resources to do this –hacker can use this on their own machine with a copy of the password file

29.16 Password Selection Strategies Proactive password checker –the system checks at the time of selection if the password is allowable –with guidance from the system users can select memorable passwords that are difficult to guess

29.17 Program Threats (Needs Host Programs) Trojan Horse –Useful program (example a game) that contains hidden code that when invoked performs some unwanted or harmful function –can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly  user may set file permission so everyone has access

29.18 Program Threats (Needs Host Programs) Trap Door –Entry point into a program that allows someone who is aware of trapdoor to gain access –used by programmers to debug and test programs  avoids necessary setup and authentication  method to activate program if something wrong with authentication procedure

29.19 Program Threats (Needs Host Programs) Logic Bomb –Logic embedded in a computer program that checks for a certain set of conditions to be present on the system  presence or absence of certain files  particular day of the week  particular user running application –When these conditions are met, it executes some function resulting in unauthorized actions