Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS7: Security 7.1. The Security Problem.

Slides:



Advertisements
Similar presentations
Chapter Five Users, Groups, Profiles, and Policies.
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.2: Evaluation of Secure Information Systems.
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS1: Overview of Operating Systems 1.1. Windows.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 1: Installing Windows XP Professional
© Neeraj Suri EU-NSF ICT March 2006 Budapesti Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Zoltán Micskei
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server 2008
Chapter Six Windows XP Security and Access Controls.
7.3. Windows Security Descriptors
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS3: Concurrency 3.5. Lab Slides & Lab Manual.
CIS 450 – Network Security Chapter 8 – Password Security.
Module 1: Installing Microsoft Windows XP Professional.
Background. History TCSEC Issues non-standard inflexible not scalable.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Chapter 3 Installing Windows XP Professional. Preparing for installation Pre-installation requirement; ◦ Hardware requirements ◦ Hardware compatibility.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Module 1: Installing Microsoft Windows XP Professional.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Unit OS11: Performance Evaluation Lab Manual.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Unit OS A: Windows Networking A.4. Lab Manual. 2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows.
Database Role Activity. DB Role and Privileges Worksheet.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS7: Security 7.4. Lab Manual.
Trusted Operating Systems
Privilege Management Chapter 22.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS1: Overview of Operating Systems 1.1. Windows.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
4 Securing Secure the hardware –Lock the server room and other ways to get access to the hardware. –Password protect the BIOS-setup Secure the NOS.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Chapter 6 – Users, Groups, and Permissions
Unit OS7: Security 7.4. Quiz Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze.
Unit OSC: Interoperability
Unit OS11: Performance Evaluation
Unit OS8: File System 8.6. Quiz
Unit OS2: Operating System Principles
Official levels of Computer Security
Operating System Security
Security.
Operating System Concepts
Presentation transcript:

Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS7: Security 7.1. The Security Problem

2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows Operating System Internals Curriculum Development Kit, developed by David A. Solomon and Mark E. Russinovich with Andreas Polze Microsoft has licensed these materials from David Solomon Expert Seminars, Inc. for distribution to academic organizations solely for use in academic environments (and not for commercial use)

3 Roadmap for Section 7.1 The Security Problem - a Definition Program & System Threats Security Ratings

4 The Security Problem System is secure if its resources are utilized and access is as intended under all circumstances Security violations: Unauthorized reading of data (theft of information) Unauthorized modification of data Unauthorized destruction of data Security measures: Physical User authorization Weakness at high-level security may circumvent low- level (operating system) measures

5 Solving the Security Problem Access to a system (1) vs. access to resources on a system (2) (1) is solved through Authentication Local or networked database of users (2) is solved through Permissions Mandatory vs. discretionary access control Capabilities vs. access control lists

6 Authentication Username/password, biometric ID, smartcards Special case of keys/capabilities System generated vs. User generated passwords (hard to remember/easy to guess) Paired passwords: system selects one/user responds appropriately How to store passwords securely one-way functions executed on passwords easy to calculate but hard to invert Shadow passwords restricted access to password files

7 Security Ratings & Windows NT Windows NT was designed to be secure from the start, which meant aiming at achieving a security rating from a recognized rating system In 1981 the National Computer Security Center (NCSC was established as part of the US DoD’s NSA to help government, corporations and home users protect proprietary, confidential information Part of the goal was to create security ratings, also known as the “Orange Book”, which were defined in 1983

8 A1 Verified Design B3 Security Domains B2 Structured Protection (Trusted XENIX) B1 Labeled Security Protection (HP-UX, Trusted IRIX, Tru64 UNIX) C2 Controlled Access Protection (highest level considered practical for general purpose OS) C1 Discretionary Access Protection (obsolete) D Minimal Protection (e.g. DOS) Security Ratings

9 Windows Security Support Microsoft’s goal was to achieve C2, which requires: Secure Logon: NT provides this by requiring user name and password Discretionary Access Control: fine grained protection over resources by user/group Security Auditing: ability to save a trail of important security events, such as access or attempted access of a resource Object reuse protection: must initialize physical resources that are reused e.g. memory, files

10 Windows Certification Certifications achieved: Windows NT 3.5 (workstation and server) with SP3 earned C2 in July 1995 In March 1999 Windows NT 4 with SP3 earned e3 rating from UK’s Information Technology Security (ITSEC) – equivalent to C2 In November 1999 NT4 with SP6a earned C2 in stand-alone and networked environments Windows meets two B-level requirements: Trusted Path Functionality: way to prevent trojan horses with “secure attention sequence” (SAS) - Ctrl-Alt-Del Trusted Facility Management: ability to assign different roles to different accounts Windows does this through account privileges

11 Common Criteria New standard, called Common Criteria (CC), is the new standard for software and OS ratings Consortium of US, UK, Germany, France, Canada, and the Netherlands in 1996 Became ISO standard in 1999 For more information, see and CC is more flexible than TCSEC trust ratings, and includes concept of Protection Profile to collect security requirements into easily specified and compared sets, and the concept of Security Target (ST) that contains a set of security requirements that can be made by reference to a PP Windows 2000 was certified as compliant with the CC Controlled Access Protection Profile (CAPP) in October 2002 Windows XP and Server 2003 are undergoing evaluation

12 A Note About Physical Security Windows is definitely not secure if someone has physical access: At the minimum they can destroy data They can easily gain access to FAT/FAT32 files (by booting DOS) They can gain access to NTFS files with NTFSDOS or ERD Commander (or free Linux-based tools) Encryption (like EFS) is the only way to secure data on systems that can have compromised physical security (like laptops) On Windows 2000, must encrypt with domain credentials On Windows XP & higher, the local administrator account is no longer a recovery agent Since credentials are cached and can be cracked, must remove SAM's encryption key from system (use syskey level 1 or 2)

13 Further Reading Mark E. Russinovich and David A. Solomon, Microsoft Windows Internals, 4th Edition, Microsoft Press, Security (from pp. 485) Ken Thompson, Reflections on Trusting Trust, Communication of the ACM, Vol. 27, No. 8, August 1984, pp