19
Operating system Security By Murtaza K. Madraswala

Operating system Security By Murtaza K. Madraswala

Embed Size (px)

Citation preview

Page 1: Operating system Security By Murtaza K. Madraswala

Operating system Security

ByMurtaza K. Madraswala

Page 2: Operating system Security By Murtaza K. Madraswala

Control access by limiting file types accessed by different users

Only authorized processes can operate on memory segments, CPU and other resources

Protection

Page 3: Operating system Security By Murtaza K. Madraswala

Security

• Protect information integrity by ensuring authentication of system users

• Prevent unauthorized access• Prevent malicious destruction of data• Prevent accidental introduction of inconsistency

Page 4: Operating system Security By Murtaza K. Madraswala

Security vs. Protection

Security takes into consideration the protection system which is strictly internal, as well as the external environment in which the system operates

Security violations can be malicious or accidental

Page 5: Operating system Security By Murtaza K. Madraswala

Security (Contd.)

Malicious violations• Unauthorized reading of data• Unauthorized writing of data• Unauthorized destruction of data• Preventing legitimate system use (Denial of service)

Page 6: Operating system Security By Murtaza K. Madraswala

Security (Contd.)

Four levels of security measures1. Physical – Physical protection of the computer system

2. Human – Screening of users given access to the computer system

3. Network

4. Operating System – OS must be capable of protecting itself from accidental or intentional security breaches

Page 7: Operating system Security By Murtaza K. Madraswala

Operating System Security

User authenticationBased on - User possession (of key or card)- User knowledge (user identifier + password)- User attribute (fingerprint, retina pattern,

signature)

Page 8: Operating system Security By Murtaza K. Madraswala

Passwords

• Password vulnerabilities

• Encrypted passwords

• One-Time passwords

Biometrics

Page 9: Operating system Security By Murtaza K. Madraswala

Program Threats

A program written by one user and used by another may cause unexpected behavior

Trojan horse –This problem is created by the operating system which allows the programs written by one user to be executed by another

This is a code segment that can misuse it environment

Page 10: Operating system Security By Murtaza K. Madraswala

Program Threats (contd.)

Trap door

Stack and buffer overflow

Page 11: Operating system Security By Murtaza K. Madraswala

System threats

Most operating systems allow processes to spawn other processes. This creates situations in which operating system resources and files are misused

Page 12: Operating system Security By Murtaza K. Madraswala

System threats (Contd.)

WormsWorms are programs that reduce system performance by spawning copies of themselves repeatedly, locking out system use by all other processes. In a network worms may reproduce across systems and bring down the entire network

Page 13: Operating system Security By Murtaza K. Madraswala

System threats (Contd.)

Viruses

A virus is a fragment of code embedded in a legitimate program. It is capable of modifying/destroying files, causing program malfunctions and system crashes.

Page 14: Operating system Security By Murtaza K. Madraswala

System threats (Contd.)

Denial of Service

The focus of this attack is to disable the legitimate use of a system/facility rather than gaining information or stealing resources

Page 15: Operating system Security By Murtaza K. Madraswala

Intrusion detection

Strives to detect attempted or successful intrusions into a computer system, and initiate a proper response.

Two approaches:

1. Signature-based detection – Here system input or traffic is examined for specific behavior patterns

2. Anomaly detection – This approach attempts to detect anomalous behavior within the computer system.

Page 16: Operating system Security By Murtaza K. Madraswala

Intrusion detection (Contd.)

• Signature-based detection attempts to characterize dangerous behavior and detects when such behavior occurs

• Anomaly detection attempts to characterize normal behaviors and detects when something abnormal occurs

Page 17: Operating system Security By Murtaza K. Madraswala

Intrusion detection (Contd.)

Auditing and logging

In audit-trail processing, security relevant events are logged to an audit trail and matched against attack signatures (signature-based detection) or analyzed for anomalous behavior (anomaly detection)

Page 18: Operating system Security By Murtaza K. Madraswala

Intrusion detection (Contd.)

System-Call Monitoring

Process system calls are monitored to detect instances when a process deviates from the expected system-call behavior

Attacks that attempt to take over a process by exploiting the buffer-overflow vulnerability, and execute the attacker’s code rather than the original code can be detected using this technique

Page 19: Operating system Security By Murtaza K. Madraswala

References

• Silberschatz, Galvin & Gagne, Operating System Concepts (6 ed.), John Wiley and Sons

• R. Summers, Secure Computing – Threats and Safeguards, McGraw-Hill

• M. Milenkovic, Operating Systems – Concepts and Designs, McGraw-Hill

• W. Stallings, Operating Systems – Internals and Design Principles, Prentice Hall