OPERATING SYSTEM
SECURITY
Understanding the Threats and Defenses
Instructor: Md Zahid Hasan
Course Code: 3201 || Operating System Preesentation
Presente
r
Mehrab Hossain Shakib
ID: 12108028
Session : 2020-21
Controls access: Manages who can use system
resources.
Safe sharing: Ensures users can share files and
directories securely.
Supports multiprogramming: Essential for
allowing multiple users and programs to operate
safely at the same time.
WHAT IS PROTECTION?
Defining Protection
OPERATING SYSTEM SECURITY
PROTECTION
WHAT IS OPERATING
SYSTEM SECURITY?
Defining OS security
Security measures deal with threats to
resources that come from outside a
computer system, while protection
measures deal with internal threats.
Passwords are the principal security tool.
Measures to prevent illegal use or
interference with resources.
Focuses on external threats.
Passwords and encryption are key
tools.
OPERATING SYSTEM SECURITY
OS SECURITY
WAY OF ATTACK
WAYS SECURITY
CAN BE ATTACKED
Understanding The Threats Landscape
OPERATING SYSTEM SECURITY
Authorization
Attacks
Browsing Trap doors Invalid
Parameters
Line Tapping
WAY OF ATTACK
WAYS SECURITY
CAN BE ATTACKED
Understanding The Threats Landscape
OPERATING SYSTEM SECURITY
Electronic data
capture
Lost Line Improper Access
Controls
Waste recovery Rogue software
Integrity: No unauthorized alterations
Secrecy: Only authorized users access
system objects
Availability: Prevent service denial and
resource hogging.
Accountability: Every action should be
traceable to the responsible user
Authenticity: Ensure the identity of
users and the validity of data
GOALS OF SECURITY SYSTEMS
Protecting the Digital Assets
OPERATING SYSTEM SECURITY
GOALS OF SECURITY SYESTEM
Malware
Buffer Overflow Technique
Network Intrusion
THREATS TO
OPERATING SYSTEM
OPERATING SYSTEM SECURITY
THREATES TO OPERATING SYSTEM
• Malware is a program designed to
gain access to computer systems,
generally for the benefit of some third
party
• Each illegal activity or violation is often
recorded either centrally using a SIEM
system or notified to an administration
• The buffer overflow technique can be
employed to force a server program to
execute an intruder-supplied code to
breach the host computer system’s
security
Understanding The Threats Landscape
HOW A BUFFER OVERFLOW
CAN BE USED TO LAUNCH A
SECURITY ATTACK?
OPERATING SYSTEM SECURITY
BUFFER OVERFLOW TECHNIQUE
Because of this vulnerability, a buffer area in
which such input is received may overflow and
overwrite contents of adjoining areas of
memory
Stack grows downward
The end address of beta
adjoins the last byte of the
parameters
The function sample
executes a return statement
Variables and return
addresses are pushed onto
stack
Overflow overwrites return
address
Code in variable beta is
invoked
TYPES OF
THREATS
SYSTEM THREATS
PROGRAM THREATS
OPERATING SYSTEM SECURITY
TYPES OF THREAT
PROGRAM THREATS
OPERATING SYSTEM SECURITY
TYPES OF THREAT
Virus
Logic Bomb
Trojan Horse
Worm
Denial of Service
SYSTEM THREATS
OPERATING SYSTEM SECURITY
TYPES OF THREAT
HOW TO ENSURE OPERATING
SYSTEM SECURITY?
Block all the way of attack!!!!
OPERATING SYSTEM
ENSUIRING SECURITY
THANK YOU

Operating System Security Problems .pptx

  • 1.
    OPERATING SYSTEM SECURITY Understanding theThreats and Defenses Instructor: Md Zahid Hasan Course Code: 3201 || Operating System Preesentation Presente r Mehrab Hossain Shakib ID: 12108028 Session : 2020-21
  • 2.
    Controls access: Manageswho can use system resources. Safe sharing: Ensures users can share files and directories securely. Supports multiprogramming: Essential for allowing multiple users and programs to operate safely at the same time. WHAT IS PROTECTION? Defining Protection OPERATING SYSTEM SECURITY PROTECTION
  • 3.
    WHAT IS OPERATING SYSTEMSECURITY? Defining OS security Security measures deal with threats to resources that come from outside a computer system, while protection measures deal with internal threats. Passwords are the principal security tool. Measures to prevent illegal use or interference with resources. Focuses on external threats. Passwords and encryption are key tools. OPERATING SYSTEM SECURITY OS SECURITY
  • 4.
    WAY OF ATTACK WAYSSECURITY CAN BE ATTACKED Understanding The Threats Landscape OPERATING SYSTEM SECURITY Authorization Attacks Browsing Trap doors Invalid Parameters Line Tapping
  • 5.
    WAY OF ATTACK WAYSSECURITY CAN BE ATTACKED Understanding The Threats Landscape OPERATING SYSTEM SECURITY Electronic data capture Lost Line Improper Access Controls Waste recovery Rogue software
  • 6.
    Integrity: No unauthorizedalterations Secrecy: Only authorized users access system objects Availability: Prevent service denial and resource hogging. Accountability: Every action should be traceable to the responsible user Authenticity: Ensure the identity of users and the validity of data GOALS OF SECURITY SYSTEMS Protecting the Digital Assets OPERATING SYSTEM SECURITY GOALS OF SECURITY SYESTEM
  • 7.
    Malware Buffer Overflow Technique NetworkIntrusion THREATS TO OPERATING SYSTEM OPERATING SYSTEM SECURITY THREATES TO OPERATING SYSTEM • Malware is a program designed to gain access to computer systems, generally for the benefit of some third party • Each illegal activity or violation is often recorded either centrally using a SIEM system or notified to an administration • The buffer overflow technique can be employed to force a server program to execute an intruder-supplied code to breach the host computer system’s security Understanding The Threats Landscape
  • 8.
    HOW A BUFFEROVERFLOW CAN BE USED TO LAUNCH A SECURITY ATTACK? OPERATING SYSTEM SECURITY BUFFER OVERFLOW TECHNIQUE Because of this vulnerability, a buffer area in which such input is received may overflow and overwrite contents of adjoining areas of memory Stack grows downward The end address of beta adjoins the last byte of the parameters The function sample executes a return statement Variables and return addresses are pushed onto stack Overflow overwrites return address Code in variable beta is invoked
  • 9.
    TYPES OF THREATS SYSTEM THREATS PROGRAMTHREATS OPERATING SYSTEM SECURITY TYPES OF THREAT
  • 10.
    PROGRAM THREATS OPERATING SYSTEMSECURITY TYPES OF THREAT Virus Logic Bomb Trojan Horse
  • 11.
    Worm Denial of Service SYSTEMTHREATS OPERATING SYSTEM SECURITY TYPES OF THREAT
  • 12.
    HOW TO ENSUREOPERATING SYSTEM SECURITY? Block all the way of attack!!!! OPERATING SYSTEM ENSUIRING SECURITY
  • 13.