OPERATING SYSTEM
SECURITY
Understanding theThreats and Defenses
Instructor: Md Zahid Hasan
Course Code: 3201 || Operating System Preesentation
Presente
r
Mehrab Hossain Shakib
ID: 12108028
Session : 2020-21
2.
Controls access: Manageswho can use system
resources.
Safe sharing: Ensures users can share files and
directories securely.
Supports multiprogramming: Essential for
allowing multiple users and programs to operate
safely at the same time.
WHAT IS PROTECTION?
Defining Protection
OPERATING SYSTEM SECURITY
PROTECTION
3.
WHAT IS OPERATING
SYSTEMSECURITY?
Defining OS security
Security measures deal with threats to
resources that come from outside a
computer system, while protection
measures deal with internal threats.
Passwords are the principal security tool.
Measures to prevent illegal use or
interference with resources.
Focuses on external threats.
Passwords and encryption are key
tools.
OPERATING SYSTEM SECURITY
OS SECURITY
4.
WAY OF ATTACK
WAYSSECURITY
CAN BE ATTACKED
Understanding The Threats Landscape
OPERATING SYSTEM SECURITY
Authorization
Attacks
Browsing Trap doors Invalid
Parameters
Line Tapping
5.
WAY OF ATTACK
WAYSSECURITY
CAN BE ATTACKED
Understanding The Threats Landscape
OPERATING SYSTEM SECURITY
Electronic data
capture
Lost Line Improper Access
Controls
Waste recovery Rogue software
6.
Integrity: No unauthorizedalterations
Secrecy: Only authorized users access
system objects
Availability: Prevent service denial and
resource hogging.
Accountability: Every action should be
traceable to the responsible user
Authenticity: Ensure the identity of
users and the validity of data
GOALS OF SECURITY SYSTEMS
Protecting the Digital Assets
OPERATING SYSTEM SECURITY
GOALS OF SECURITY SYESTEM
7.
Malware
Buffer Overflow Technique
NetworkIntrusion
THREATS TO
OPERATING SYSTEM
OPERATING SYSTEM SECURITY
THREATES TO OPERATING SYSTEM
• Malware is a program designed to
gain access to computer systems,
generally for the benefit of some third
party
• Each illegal activity or violation is often
recorded either centrally using a SIEM
system or notified to an administration
• The buffer overflow technique can be
employed to force a server program to
execute an intruder-supplied code to
breach the host computer system’s
security
Understanding The Threats Landscape
8.
HOW A BUFFEROVERFLOW
CAN BE USED TO LAUNCH A
SECURITY ATTACK?
OPERATING SYSTEM SECURITY
BUFFER OVERFLOW TECHNIQUE
Because of this vulnerability, a buffer area in
which such input is received may overflow and
overwrite contents of adjoining areas of
memory
Stack grows downward
The end address of beta
adjoins the last byte of the
parameters
The function sample
executes a return statement
Variables and return
addresses are pushed onto
stack
Overflow overwrites return
address
Code in variable beta is
invoked