Chapter 4 – Protection in General Purpose Operating Systems  Protection features provided by general-purpose operating systems— protecting memory, files,

Slides:



Advertisements
Similar presentations
CHAPTER 4 Protection in General-Purpose Operating Systems (c) by Syed Ardi Syed Yahya Kamal, UTM
Advertisements

Password Cracking Lesson 10. Why crack passwords?
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Access Control Methodologies
Chapter 6 User Protections in OS. csci5233 computer security & integrity (Chap. 6) 2 Outline User-level protections 1.Memory protection 2.Control of access.
CSC 405 Introduction to Computer Security
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
7-1 Last time Protection in General-Purpose Operating Systems History Separation vs. Sharing Segmentation and Paging Access Control Matrix Access Control.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 6 Module 6 Security in Operating Systems  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Memory Management Design & Implementation Segmentation Chapter 4.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
19: Protection1 PROTECTION Protection is the mechanism for controlling access to computer resources. Security concerns the physical integrity of the system.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.
95-752:7-1 Operating System Features :7-2 Operating System Features Memory protection Temporary file issues Dead space issues Sandboxing Object.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
SE571 Security in Computing
G Robert Grimm New York University Protection and the Control of Information Sharing in Multics.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
Systems Security & Audit Operating Systems security.
Lecture 18 Page 1 CS 111 Online Access Control Security could be easy – If we didn’t want anyone to get access to anything The trick is giving access to.
File Protection Mechanisms  All-None Protection Lack of trustLack of trust All or nothingAll or nothing Timesharing issuesTimesharing issues ComplexityComplexity.
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Announcements Assignment 3 due. Invite friends, co-workers to your presentations. Course evaluations on Friday.
Access Control Identification and Authentication.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
Security in Operating Systems Cuiwei Zhao. Security in Operating System §Security breaches §Security goals §Protected objects of the general purpose operating.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
Bzupages.com. Operating System: Presented To: Sir. Ahsan Raza Presented By: Shaista Sumreen (06-04) Aliya Zafar (06-06) Mamoona Sadia (06-08) Javaria.
Security in Computing Protection in General-Purpose Operating Systems.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
Linux-vs-Windows Security
Lecture 14 Page 1 CS 111 Summer 2013 Security in Operating Systems: Basics CS 111 Operating Systems Peter Reiher.
Fall 2006CS 395: Computer Security1 Protection in Operating Systems Well, a brief consideration of it. There is too much material to cover this in any.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 15: Access Control Mechanisms Dr. Wayne Summers Department of Computer Science Columbus State University
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
ACCESS MATRIX IMPLEMENTATION AND COMPARISON By: Rushabh Dharwadkar Roll no: TE COMP.
SECURITY IN COMPUTING BY PFLEEGER Operating Systems Security.
Computer Security: Chapter 5 Operating Systems Security.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
6- 1 Last time ● Controls against security flaws in programs ● Various controls applicable to each of the stages in the software development lifecycle.
Identification and Authentication
Chapter 14: System Protection
Computer Data Security & Privacy
General OS Security: Memory Protection and Access Control
Chapter 14: Protection.
Operating Systems Security
Protection in Operating Systems
Chapter 14: Protection.
CE Operating Systems Lecture 21
SECURITY IN THE LINUX OPERATING SYSTEM
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Access Control Dr. X Parenthesis: before we dive deeper into crypto, we will explore and old but still valid security principle, access controls.
Access Control and Audit
Presentation transcript:

Chapter 4 – Protection in General Purpose Operating Systems  Protection features provided by general-purpose operating systems— protecting memory, files, and the execution environment  Controlled access to objects  User authentication

Protected Objects and Methods of Protections  1rst OS were simple utilities – executives  Multiprogramming OS required monitors which oversaw each program’s execution  Protected objects MemoryMemory Sharable I/O devices (disks)Sharable I/O devices (disks) Serially reusable devices (printers)Serially reusable devices (printers) Shareable programs & subproceduresShareable programs & subprocedures NetworksNetworks Shareable DataShareable Data

Security Methods of Operating Systems  Physical Separation (different processes use different objects)  Temporal Separation (processes executed at different times)  Logical Separation (process appears to be alone)  Cryptographic Separation (processes conceal data and computations)

Security Methods of Operating Systems  Want to be able to share resources without compromising security Do not protectDo not protect Isolate different processesIsolate different processes Share all or nothingShare all or nothing Share via access limitation (granularity)Share via access limitation (granularity) Share by capabilitiesShare by capabilities Limit use of an objectLimit use of an object

Memory & Address Protection  Fence – confines user to one side of boundary Use predefined memory addressesUse predefined memory addresses Can protect OS, but not one user from anotherCan protect OS, but not one user from another  Relocation – changes all addresses of program using offset  Base/Bounds Registers Uses variable fence register (base register) to provide lower boundUses variable fence register (base register) to provide lower bound Uses bounds register for upper addressUses bounds register for upper address

Memory & Address Protection  Tagged Architecture Every word of machine memory has extra bits to indicate access rights (expensive)Every word of machine memory has extra bits to indicate access rights (expensive)  Segmentation (program divided into pieces) Each segment has name & offsetEach segment has name & offset  Each address reference is checked for protection  Different classes of data can be assigned different levels of protection  Users can share access to segments  User cannot access an unpermitted segment  Paging (program uses equal sized “pages”; memory divided into equal sized page frames)

Control of Access to General Objects  Memory  File/data set  Program in memory  Directory of files  Hardware device  Data structure (stack)  Operating system table  Instructions (privileged)  Passwords / user authentication mechanism  Protection mechanism

Goals in protecting objects  Check every access  Enforce least privilege  Verify acceptable usage

Directory mechanism  Each user (subject) has a file directory, which lists all files accessible by user  List can become too large if many shared objects  Cannot revoke rights of everyone to an object  File names for different owners may be different

Access Control List  One list for each object with list showing all subjects & their access rights  Can use wildcards to limit size of ACL  Access Control Matrix Rows for subjectsRows for subjects Columns for objectsColumns for objects Sparse matrix of triples Sparse matrix of triples

Capability  Unforgeable token that gives possessor rights to an object  Predecessor of Kerberos  Can propagate capabilities to other subjects  Capabilities must be stored in inaccessible memory

Procedure-Oriented Access Control  Procedure that controls access to objects including what subjects can do to objects

File Protection Mechanisms  All-None Protection Lack of trustLack of trust All or nothingAll or nothing Timesharing issuesTimesharing issues ComplexityComplexity File listingsFile listings

File Protection Mechanisms  Group Protection User cannot belong to two groupsUser cannot belong to two groups Forces one person to be multiple usersForces one person to be multiple users Forces user to be put into all groupsForces user to be put into all groups Files can only be shared within groupsFiles can only be shared within groups

File Protection Mechanisms  Single Permissions Password/Token for each filePassword/Token for each file  Can be lost  Inconvenient  Must be protected (if changed, must notify all users) Temporary Acquired PermissionTemporary Acquired Permission  UNIX’s set userid (suid)

User Authentication  Something the user knows (password, PIN, passphrase, mother’s maiden name)  Something the user has (ID, key, driver’s license, uniform)  Something the user is (biometrics)

Use of Passwords  Mutually agreed-upon code words, assumed known only to user and system  First line of defense  Loose-Lipped Systems WELCOME TO XYZ COMPUTINGWELCOME TO XYZ COMPUTING ENTER USER ID: summersENTER USER ID: summers INVALID USER NAMEINVALID USER NAME ENTER USER ID:ENTER USER ID:

Attack on Passwords  Ask the user  Search for the system list of passwords Find a valid user IDFind a valid user ID Create a list of possible passwords (encrypt if needed)Create a list of possible passwords (encrypt if needed) Rank the passwords from high to low probabilityRank the passwords from high to low probability Try each passwordTry each password If attempt fails, try again (don't exceed password lockout)If attempt fails, try again (don't exceed password lockout)

Attack on Passwords  Exhaustive Attack (brute-force) 18,278 passwords of 3 letters or less18,278 passwords of 3 letters or less 1 password / millisecond would take 18 seconds (8 minutes for 4 letters, 3.5 hours for 5 letters)1 password / millisecond would take 18 seconds (8 minutes for 4 letters, 3.5 hours for 5 letters)  Probable passwords (dictionary attack) 80,000 word dictionary would take 80 seconds80,000 word dictionary would take 80 seconds Expanded “dictionary”Expanded “dictionary”

Attack on Passwords  UK Study ( words/?related) 50% passwords were family names50% passwords were family names Celebrities/soccer stars – 9% eachCelebrities/soccer stars – 9% each Pets – 8%Pets – 8% 10% reflect a fantasy10% reflect a fantasy Only 10% use cryptic combinationsOnly 10% use cryptic combinations

Attack on Passwords  Look on desk…  Try no password  Try user ID  Try user’s name  Common words (password, private, secret)  Short dictionary  Complete English word list  Common non-English dictionaries  Dictionary with capitalization and substitutions (0 for o and 1 for i)  Brute force (lowercase alphabet)  Brute force (full character set)

Attack on Passwords  Plaintext System Password List (MS Windows)  Encrypted Password List – 1-way (/etc/passwd)  Shadow Password List (/etc/shadow)  Salt – 12-bit number formed from system time and process id; concatenated to password

Password Selection Criteria  Use characters other than A-Z  Choose long passwords  Avoid names and words  Choose unlikely password  Change password regularly (don’t reuse)  Don’t write it down  Don’t tell anyone  ds/passwords.html ds/passwords.html ds/passwords.html  One-time passwords

Authentication  Should be slow (5-10 seconds)  Should only allow a limited # of failures (e.g. 3)  Challenge-Response Systems  Impersonation of Login  Authentication Other than Passwords