Operating system Security By Murtaza K. Madraswala.

Slides:



Advertisements
Similar presentations
Chapter 15 Computer Security Techniques
Advertisements

Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Chapter 15 Security Bernard Chen Spring Protection vs. Security Protection (Ch.14) deals with internal problem Security (Ch. 15) Deals with external.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security  The Security Problem  Authentication  Program Threats  System Threats  Securing Systems  Intrusion (unwanted involvement) Detection  Encryption.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Introducing Computer and Network Security
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Operating Systems Protection & Security.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
BUSINESS B1 Information Security.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Operating Systems 1 K. Salah Module 6.0: Security and Protection  Types of misuse: –1. Accidental –2. Intentional –Protection is to prevent either accidental.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Systems II San Pham CS /20/03. Topics Operating Systems Resource Management – Process Management – CPU Scheduling – Deadlock Protection/Security.
Information Security What is Information Security?
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
Cryptography and Network Security Sixth Edition by William Stallings.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection System
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14a: Security I.
Some Great Open Source Intrusion Detection Systems (IDSs)
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Access control techniques
Network security threats
Goals of protection Protection is required to prevent mischievous, intentional violation of an access restriction by a user. The use of system resources.
Security Shmuel Wimer prepared and instructed by
Operating system Security
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
12: Security The Security Problem Authentication Program Threats
Operating System Security
Security.
Intrusion Detection system
Operating System Concepts
Chapter # 3 COMPUTER AND INTERNET CRIME
Operating System Concepts
Chapter Goals Discuss the CIA triad
Presentation transcript:

Operating system Security By Murtaza K. Madraswala

Control access by limiting file types accessed by different users Only authorized processes can operate on memory segments, CPU and other resources Protection

Security Protect information integrity by ensuring authentication of system users Prevent unauthorized access Prevent malicious destruction of data Prevent accidental introduction of inconsistency

Security vs. Protection Security takes into consideration the protection system which is strictly internal, as well as the external environment in which the system operates Security violations can be malicious or accidental

Security (Contd.) Malicious violations Unauthorized reading of data Unauthorized writing of data Unauthorized destruction of data Preventing legitimate system use (Denial of service)

Security (Contd.) Four levels of security measures 1.Physical – Physical protection of the computer system 2.Human – Screening of users given access to the computer system 3.Network 4.Operating System – OS must be capable of protecting itself from accidental or intentional security breaches

Operating System Security User authentication Based on -User possession (of key or card) -User knowledge (user identifier + password) -User attribute (fingerprint, retina pattern, signature)

Passwords Password vulnerabilities Encrypted passwords One-Time passwords Biometrics

Program Threats A program written by one user and used by another may cause unexpected behavior Trojan horse – This problem is created by the operating system which allows the programs written by one user to be executed by another This is a code segment that can misuse it environment

Program Threats (contd.) Trap door Stack and buffer overflow

System threats Most operating systems allow processes to spawn other processes. This creates situations in which operating system resources and files are misused

System threats (Contd.) Worms Worms are programs that reduce system performance by spawning copies of themselves repeatedly, locking out system use by all other processes. In a network worms may reproduce across systems and bring down the entire network

System threats (Contd.) Viruses A virus is a fragment of code embedded in a legitimate program. It is capable of modifying/destroying files, causing program malfunctions and system crashes.

System threats (Contd.) Denial of Service The focus of this attack is to disable the legitimate use of a system/facility rather than gaining information or stealing resources

Intrusion detection Strives to detect attempted or successful intrusions into a computer system, and initiate a proper response. Two approaches: 1.Signature-based detection – Here system input or traffic is examined for specific behavior patterns 2.Anomaly detection – This approach attempts to detect anomalous behavior within the computer system.

Intrusion detection (Contd.) Signature-based detection attempts to characterize dangerous behavior and detects when such behavior occurs Anomaly detection attempts to characterize normal behaviors and detects when something abnormal occurs

Intrusion detection (Contd.) Auditing and logging In audit-trail processing, security relevant events are logged to an audit trail and matched against attack signatures (signature-based detection) or analyzed for anomalous behavior (anomaly detection)

Intrusion detection (Contd.) System-Call Monitoring Process system calls are monitored to detect instances when a process deviates from the expected system-call behavior Attacks that attempt to take over a process by exploiting the buffer-overflow vulnerability, and execute the attacker’s code rather than the original code can be detected using this technique

References Silberschatz, Galvin & Gagne, Operating System Concepts (6 ed.), John Wiley and Sons R. Summers, Secure Computing – Threats and Safeguards, McGraw-Hill M. Milenkovic, Operating Systems – Concepts and Designs, McGraw-Hill W. Stallings, Operating Systems – Internals and Design Principles, Prentice Hall