0% found this document useful (0 votes)
39 views38 pages

Chapter 6

The document provides a comprehensive overview of operating system security, detailing policies and mechanisms for user authentication, data confidentiality, integrity, and availability. It discusses various threats to system security, including program and system threats, and emphasizes the importance of implementing protection mechanisms and the principle of least privilege. Additionally, it outlines best practices for maintaining security, such as keeping the operating system updated and using firewalls.

Uploaded by

Abinet Arba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views38 pages

Chapter 6

The document provides a comprehensive overview of operating system security, detailing policies and mechanisms for user authentication, data confidentiality, integrity, and availability. It discusses various threats to system security, including program and system threats, and emphasizes the importance of implementing protection mechanisms and the principle of least privilege. Additionally, it outlines best practices for maintaining security, such as keeping the operating system updated and using firewalls.

Uploaded by

Abinet Arba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Prepared By: Jerusalem Y.

Security and Protection 5/25/2019 1


 Overview of system security
 Policy/mechanism separation
 Protection, access, and authentication
 Memory protection
 Encryption
 Recovery management

Security and Protection 5/25/2019 2


 Operating system security (OS security) is the process of
ensuring OS integrity, confidentiality and availability.
 OS security refers to specified steps or measures used to
protect the OS from threats, viruses, worms or remote hacker
intrusions.
 OS security encompasses all preventive-control techniques,
which safeguard any computer assets capable of being stolen,
edited or deleted if OS security is compromised.

Security and Protection 5/25/2019 3


Security
 Policy: Whether a person can become a user of the system. The
system administrator employs the policy while registering new
users.
 Mechanisms: Add or delete users, verify whether a person is a
registered user ( i.e. perform authentication), perform
encryption to ensure confidentiality of passwords.
Protection
 Policy: The file owner specifies the authorization policy for a
file. It decides which user can access a file and in what manner.
 Mechanisms: Set or change authorization information for a
file. Check whether a file processing request conforms to the
user’s privileges.

Security and Protection 5/25/2019 4


1. Confidentiality: This term covers two related concepts:
 Data confidentiality: Assures that private or confidential
information is not made available or disclosed to unauthorized
individuals
 Privacy: Assures that individuals control or influence what
information related to them may be collected and stored and
by whom and to whom that information may be disclosed
2. Integrity: This term covers two related concepts
 Data integrity: Assures that information and programs are
changed only in a specified and authorized manner
 System integrity: Assures that a system performs its intended
function in an unimpaired manner, free from deliberate or
inadvertent unauthorized manipulation of the system

Security and Protection 5/25/2019 5


3. Availability: Assures that systems work properly and
service is not denied to authorized users.

Security and Protection 5/25/2019 6


 To prevent malicious misuse of the system by users or
programs.
 To ensure that each shared resource is used only in accordance
with system policies, which may be set either by system
designers or by system administrators.
 To ensure that errant programs cause the minimal amount of
damage possible.
Note
 Protection systems only provide the mechanisms for enforcing
policies and ensuring reliable systems.
 It is up to administrators and users to implement those
mechanisms effectively.

Security and Protection 5/25/2019 7


 Separation: keeping one user’s objects separate from other
users’ basis of protections is separation (keeping user objects
away from other users)
 Methods of Separation:
◦ Physical – nothing shared
◦ Temporal – operating things a different times
◦ Logical – running together but can’t access each other
◦ Cryptographic - running together but hidden

Security and Protection 5/25/2019 8


 Do not Prevent – no protection when procedure are being run
at different times
 Isolate – running concurrently but aware of each other;
separate space, objects and files
 Share all or share nothing – owner of objects declare it
public or private (all or none)
 Share via access limitation – each user is checked for access
availability of an object
 Share by compatibilities- dynamic creation of shared objects

 Limit use of an object- user has varying access to an object

each has a varying level of granularity - Greater granularity


creates greater access control

Security and Protection 5/25/2019 9


 Security refers to providing a protection system to computer
system resources such as CPU, memory, disk, software
programs and most importantly data/information stored in the
computer system.
 If a computer program is run by an unauthorized user, then
he/she may cause harsh damage to computer or data stored in
it.
 So a computer system must be protected against unauthorized
access, malicious access to system memory, viruses, worms
etc.

Security and Protection 5/25/2019 10


 Authentication refers to identifying each user of the system
and associating the executing programs with those users.
 It is the responsibility of the Operating System to create a
protection system which ensures that a user who is running a
particular program is authentic.
 Operating Systems generally identifies/authenticates users
using following three ways
1. Username / Password − User need to enter a registered
username and password with Operating system to login into
the system.

Security and Protection 5/25/2019 11


2. User card/key − User need to punch card in card slot, or
enter key generated by key generator in option provided by
operating system to login into the system.
3. User attribute - fingerprint/ eye retina pattern/
signature − User need to pass his/her attribute via
designated input device used by operating system to login
into the system.

Security and Protection 5/25/2019 12


 One-time passwords provide additional security along with
normal authentication.
 In One-Time Password system, a unique password is required
every time user tries to login into the system.
 Once a one-time password is used, then it cannot be used
again.
 One-time password are implemented in various ways.
1. Random numbers − Users are provided cards having
numbers printed along with corresponding alphabets. System
asks for numbers corresponding to few alphabets randomly
chosen.

Security and Protection 5/25/2019 13


2. Secret key − User are provided a hardware device which
can create a secret id mapped with user id. System asks for
such secret id which is to be generated every time prior to
login.
3. Network password − Some commercial applications send
one-time passwords to user on registered mobile/ email
which is required to be entered prior to login.

Security and Protection 5/25/2019 14


 Operating system's processes do designated task as instructed.
 If a user program made these process do malicious tasks, then
it is known as Program Threats.
 One of the common example of program threat is a program
installed in a computer which can store and send user
credentials via network to some hacker.
 Following is the list of some well-known program threats.
 Trojan Horse − Such program traps user login credentials
and stores them to send to malicious user who can later on
login to computer and can access system resources.
 Trap Door − If a program which is designed to work as
required, have a security hole in its code and perform illegal
action without knowledge of user then it is called to have a
trap door.
Security and Protection 5/25/2019 15
 Logic Bomb − Logic bomb is a situation when a program
misbehaves only when certain conditions met otherwise it
works as a genuine program. It is harder to detect.
 Virus − Virus as name suggest can replicate themselves on
computer system.
 They are highly dangerous and can modify/delete user files,
crash systems.
 A virus is generally a small code embedded in a program.
 As user accesses the program, the virus starts getting
embedded in other files/ programs and can make system
unusable for user

Security and Protection 5/25/2019 16


 System threats refers to misuse of system services and
network connections to put user in trouble.
 System threats can be used to launch program threats on a
complete network called as program attack.
 System threats creates such an environment that operating
system resources/ user files are misused.
 Following is the list of some well-known system threats.
 Worm − Worm is a process which can choke down a system
performance by using system resources to extreme levels.
 A Worm process generates its multiple copies where each copy
uses system resources, prevents all other processes to get
required resources.
 Worms processes can even shut down an entire network.

Security and Protection 5/25/2019 17


 Port Scanning − Port scanning is a mechanism or means by
which a hacker can detects system vulnerabilities to make an
attack on the system.
 Denial of Service − Denial of service attacks normally
prevents user to make legitimate use of the system.
 For example, a user may not be able to use internet if denial of
service attacks browser's content settings.

Security and Protection 5/25/2019 18


 Examples of security threats:
◦ Threats raised by data and programs downloaded from the
Internet
 Examples of protection threats:
◦ Illegal access to a resource or a service by a process
◦ An attempt to tamper with messages
 Security threats can arise more easily in a distributed OS

Security and Protection 5/25/2019 19


1. Keep The Operating System Updated
 The first step in protecting your computer from any malicious
there is to ensure that your operating system is up-to-date.
 This is essential if you are running a Microsoft Windows OS.
 Secondly, you need to have anti-virus software installed on
your system and ensure you download updates frequently to
ensure your software has the latest fixes for new viruses,
worms, and Trojan horses.
 Additionally, you want to make sure your anti-virus program
has the capability to scan e-mail and files as they are
downloaded from the internet, and you also need to run full
disk scans periodically.
 This will help prevent malicious programs from even reaching
your computer.

Security and Protection 5/25/2019 20


2. Use a Firewall
 You should also install a firewall.
 A firewall is a system that prevents unauthorized use and
access to your computer.
 A firewall can be either hardware or software.
 Hardware firewalls provide a strong degree of protection from
most forms of attack coming from the outside world and can
be purchased as a stand-alone product or in broadband routers.
 Unfortunately, when battling viruses, worms and Trojans, a
hardware firewall may be less effective than a software
firewall, as it could possibly ignore embedded worms in out
going e-mails.

Security and Protection 5/25/2019 21


 For individual home users, the most popular firewall choice is
a software firewall.
 A good software firewall will protect your computer from
outside attempts to control or gain access your computer, and
usually provides additional protection against the most
common Trojan programs or e-mail worms.
 The downside to software firewalls is that they will only
protect the computer they are installed on, not a network.
 It is important to remember that on its own a firewall is not
going to rid you of your computer virus problems, but when
used in conjunction with regular operating system updates and
a good anti-virus scanning software, it will add some extra
security and protection for your computer or network.

Security and Protection 5/25/2019 22


 Security and Protection deal with the control of unauthorized
use and the access to resources of a computer system.
 Protection refers to mechanism while security refers to policy.
 Protection system consists of mechanisms to control user
access to system hardware and software resources or to control
information flow in the system.
 Protection domain of a process specifies the resources that it
can access and the types of operations that the process can
perform on the resources. This limits a process's access to only
needed resources.

Security and Protection 5/25/2019 23


 Protected Objects and Methods
 Protecting Memory and Addressing
 Protecting Access to General Objects
 File Protection Mechanisms
 User Authentication

Security and Protection 5/25/2019 24


 Memory
 Sharable I/O devices, such as disks
 Serially reusable I/O devices, such as printers and
tape drives
 Sharable programs and sub-procedures
 Sharable data

Security and Protection 5/25/2019 25


 Memory protection is a way to control memory access rights on
a computer, and is a part of most modern instruction set
architectures and operating systems.
 The main purpose of memory protection is to prevent a process
from accessing memory that has not been allocated to it.
 This prevents a bug or malware within a process from affecting
other processes, or the operating system itself.
 An attempt to access unowned memory results in a hardware fault,
called a segmentation fault or storage violation exception,
generally causing abnormal termination of the offending process.
 Memory protection for computer security includes additional
techniques such as address space layout
randomization and executable space protection.

Security and Protection 5/25/2019 26


 Some of memory protection methods are:
1. Segmentation
2. Paged virtual memory
3. Protection keys
4. Simulated segmentation
5. Capability-based addressing
6. Dynamic tainting
Measures
 The protection level of a particular implementation may be
measured by how closely it adheres to the principle of
minimum privilege.

Security and Protection 5/25/2019 27


 The principle of least privilege is the idea that at any user,
program, or process should have only the bare minimum
privileges necessary to perform its function.
 For example, a user account created for pulling records from
a database doesn’t need admin rights, while a programmer
whose main function is updating lines of legacy code doesn’t
need access to financial records.
 The principle of least privilege can also be referred to as the
principle of minimal privilege (POMP) or the principle of least
authority (POLA).

Security and Protection 5/25/2019 28


 The principle of least privilege works by allowing only
enough access to perform the required job.
 In an IT environment, adhering to the principle of least
privilege reduces the risk of attackers gaining access to critical
systems or sensitive data by compromising a low-level user
account, device, or application.
 Implementing the POLP helps contain compromises to their
area of origin, stopping them from spreading to the system at
large.

Security and Protection 5/25/2019 29


 The principle of least privilege can be applied to every level of
a system.
 It applies to end users, systems, processes, networks,
databases, applications, and every other facet of an IT
environment.
 Below are just a few examples of how the principle can work
in practice.
1. User Account with Least Privilege
 With the principle of least privilege, an employee whose job is
to enter info into a database only needs the ability to add
records to that database.

Security and Protection 5/25/2019 30


2. MySQL Accounts with Least Privilege
 A MySQL setup follows the principle of least privilege when
it employs several different accounts to perform unique tasks.
 Ideally, an online form that lets users sort data should use a
MySQL account that only has sorting privileges.
 That way, an attacker who exploits the form has only gained
the power to sort records.
 Conversely, if the account is given the power to delete records,
the attacker can now wipe out the entire database.

Security and Protection 5/25/2019 31


There are many benefits of implementing the principle of least
privilege:
 Better security

 Minimized attack surface

 Limited malware propagation

 Better stability

 Improved audit readiness

Security and Protection 5/25/2019 32


 The translation of data into a secret code.
 Encryption is the most effective way to achieve data security.
 To read an encrypted file, you must have access to a secret
key or password that enables you to decrypt it.
 Unencrypted data is called plain text
 Encrypted data is referred to as cipher text.
 Encryption is widely used on the internet to protect user
information being sent between a browser and a server,
including passwords, payment information and other personal
information that should be considered private.
 Organizations and individuals also commonly use encryption
to protect sensitive data stored on computers, servers and
mobile devices like phones or tablets.

Security and Protection 5/25/2019 33


 Unencrypted data, often referred to as plaintext, is encrypted
using an encryption algorithm and an encryption key.
 This process generates cipher text that can only be viewed in
its original form if decrypted with the correct key.
 Decryption is simply the inverse of encryption, following the
same steps but reversing the order in which the keys are
applied.
 Today's most widely used encryption algorithms fall into two
categories: symmetric and asymmetric.

Security and Protection 5/25/2019 34


Security and Protection 5/25/2019 35
 The primary purpose of encryption is to protect the
confidentiality of digital data stored on computer systems or
transmitted via the internet or any other computer network.
 A number of organizations and standards bodies either
recommend or require sensitive data to be encrypted in order
to prevent unauthorized third parties or threat actors from
accessing the data.
 For example, the Payment Card Industry Data Security
Standard requires merchants to encrypt customers' payment
card data when it is both stored at rest and transmitted across
public networks.

Security and Protection 5/25/2019 36


 Backup and recovery refers to the process of backing up data
in case of a loss and setting up systems that allow data
recovery due to data loss.
 Backing up data requires copying and archiving computer
data, so that it is accessible in case of data deletion or
corruption.
 Data from an earlier time may only be recovered if it has been
backed up.

Security and Protection 5/25/2019 37


 Backup is the act of creating copies of information such that it
may be recovered
 Archive is to keep these backups for a long period of time in
order to meet some legal aspects
 Should the backup be kept online or offline?

 Online makes easier access, faster recover

 Offline is more secure, harder to recover

Why not both?


 Users should keep their own offline backups, in case online
backup gets removed
 Data may be lost accidentally (hardware failures, human
mistake) or intentionally

Security and Protection 5/25/2019 38

You might also like