SlideShare a Scribd company logo
95-752:6-1
Operating System Security
95-752:6-2
Users
• UNIX user -> username -> uid
– uid is systems real name for user
– integer 0 ... 65536 (varies in some systems)
– mapping is in /etc/passwd
shimeall:*:5003:20:Tim:/users/shimeall:csh
• More than one username may map to a uid
– Desired for some system purposes (program tracking)
– Problem for ordinary users (confused file ownership)
– Security problem (hacker makes duplicate uid account)
• Temporary uid change: su
95-752:6-3
Groups
• User - one or more groups
• Group - zero or more users
– Used for file permissions
– Defined by /etc/groups and network sharing software
– ypcat group.byname
– gid - integer system name for group (generally unique)
• Listed for individual users with groups
• Change group of file with chgrp
– chgrp newgroup myfile
95-752:6-4
SETUID and SETGID
• Special mechanisms: temporarily use a uid or gid
during the execution of a program)
• Part of mode bits
– s in user x field - setuid
– s in group x field - setgid
• To be effective, both s and x must be set
– chmod a+x myprog
– chmod u+s myprog
– chmod 4755 myprog
• WARNING: Lots of subtle security holes!
95-752:6-5
Dangerous Accounts
• root – superuser
• open, guest, play, nobody - courtesy
accounts
• Accounts without passwords
• uucp, sync, pspq - single-command
accounts
• Group accounts
95-752:6-6
User Policy
• Restricting access
– commands
– file access
– login times
– network access
– terminal access
• Inactive users
– Detection
– Password change
– Locking (change shell)
– Deletion (after backup)
• Ultimately - need multilevel security
95-752:6-7
Multilevel Security
• Users with different needs to know sharing
computer or network
• If don’t need to know – shouldn’t even be
able to determine if information exists
• Should be able to filter functionality based
on allowable information
• Mandatory and Discretionary protections
95-752:6-8
Monitor Model
• General Schema:
– Takes user's request.
– Consults access control information.
– Allows or disallows request.
• Advantages
– Easy to implement.
– Easy to understand
• Disadvantages
– Bottleneck in system
– Controls only direct accesses (not inferences)
95-752:6-9
Graham-Denning Model
• Introduces protection rules that operate on:
– A set of subjects S
– A set of objects O
– A set of rights R
– An access control matrix
Subjects S1 S2 O1 O2
s1 Control Read* Owner read
s2 Control Owner
95-752:6-10
Graham-Denning Rights
Eight primitive protection rights
– create, delete object
– create, delete subject
– read, grant, delete, transfer access right
95-752:6-11
Military Security Model
• Information is ranked:
– Unclassified
– Confidential
– Secret
– Top Secret
• Least Privilege: Subject should have access to
fewest objects needed for successful work
– The system backup program may be allowed to bypass
read restrictions on files, but it would not have the
ability to modify files.
– Need to Know”
95-752:6-12
Compartmentalization
Information may belong to one or more
compartments
Compartments are used to enforce need-to-know.
• Classification of Information:
<rank; compartments>
• Clearance: <rank; compartments>
– an indication of a level of trust
• A subject can access an object only if
– The clearance level of the subject is at least as high as
that of the information.
– The subject has a need to know about all compartments
for which the information is classified.
95-752:6-13
Information Flow Models
• Acts as an intelligent filter to control the
transfer of information permitted by access
to a particular object.
• Information flow analysis can assure that
operating system modules that have access
to sensitive data cannot leak that data to
calling modules.
95-752:6-14
Bell-LaPadula Model
• A formal description of the allowable paths of
information flow in a secure system.
– Applies only to privacy
– Identifies paths that could lead to inappropriate
disclosures.
– Is used as the basis for the design of systems that
handle data of multiple levels.
– Includes both discretionary and mandatory access rules
• B-LP Discretionary Access Control
– Uses Access Matrix similar to Graham-Denning Model
– Includes functions for dealing with the access matrix.
95-752:6-15
Bell-LaPadula Mandatory
Controls
• Fixed security classes for each subject and
each object
• Security classes ordered by a relation
– Tranquility constraint prevents access classes of
objects from changing
• Simple Security Property
• * Property
95-752:6-16
Bell-LaPadula Properties
Simple Security Property:
• Subject may have read access only if object
classified at same level or lower.
* - Property
• Subject may have write access only if all
objects read are at same level or higher than
object to be written.
95-752:6-17
Biba Model
• Concerned with integrity rather than
secrecy.
• Defines integrity levels much like
sensitivity levels.
– Fixed integrity classes for each subject and
each object
– Ordered integrity classes
95-752:6-18
Biba Properties
Simple Integrity Property:
• Subject can modify object only if integrity class at
least as high as the object. (untrusted subjects
reduce integrity class when writing)
* - Property:
• Subjects may have write access only if the
integrity of objects they are reading is at least as
high as the object to be written. (untrusted sources
reduce integrity of results)
95-752:6-19
Integrity Preservation
A high integrity file is one whose contents are
created by high-integrity processes.
• high-integrity file cannot be contaminated by
information from low-integrity processes.
• high-integrity process cannot be subverted by low
integrity processes or data.
The integrity class label on a file guarantees that the
contents came only from sources of at least that
degree of integrity.
95-752:6-20
Secure Operating Systems
Basic Features of a Multiprogramming OS
– Authentication of users.
– Protection of memory.
– File and I/O device access control.
– Allocation and access control to general objects.
– Enforcement of sharing.
– Guarantee of fair service.
– Interprocess communication and synchronization.
• Basic Considerations
– Security must be considered in every aspect of the
design of operating systems.
– It is difficult to add on security features.
95-752:6-21
Basic Design Principles
• Least privilege - fewest possible privileges for
user.
• Economy of mechanism - small, simple, straight
forward.
• Open design
• Complete mediation - check every access
• Permission based - default is denial of access.
• Separation of privilege - no single super user.
• Least common mechanism - avoid shared objects.
• Easy to use.
95-752:6-22
Security Kernel
• Responsible for implementing the security
mechanisms of the entire operating system.
• Provides the security interfaces among the
hardware, the operating system, and the
other parts of the computing system.
• Implementation of a security kernel:
– May degrade system performance (one more
layer).
– May be large.
– No guarantees.
95-752:6-23
Backups
• First line of defense against denial-of-service and
modification threats
• Don’t depend on system backups for important
data
• User backups
• Administrator backups:
– Day-zero backup
– Upgrade backup
– Full backup
– Incremental backup
95-752:6-24
Backup Policy
• One backup volume per partition
• Time backup for restoration
– How much work are we willing to lose?
• Verify backup at archive location
– Content - not just format
– Ensure operator training
– Ensure archive environment
• Rotate media
– Need more than most recent backup
• Maintain physical security on backups
• Maintain logical security on backups
• Be careful about legal issues on backups
95-752:6-25
Integrity
• Compromise of integrity equal to compromise of
privacy
• Integrity threats:
– Change permissions to allow modification/reading
– Change password file
– Change device / interface configurations
– Move files
– Replace system programs with substitutes
– Replace log files with sanitized versions
• 95% of UNIX security incidents result of
misconfiguration
95-752:6-26
Integrity Protection Strategies
• Prevention
• Detection
• Recovery
95-752:6-27
Unix Operation Modes
• Normal Operating Mode:
– Any user login
– Diverse command set
– Network operations
– Import and export files
• Single User Mode:
– Intended for system maintenance / full backup
– Only root login allowed
– Restricted command set
– No network operations
– No file import/export
95-752:6-28
Prevention Strategies
• Software Controls:
– File permissions
– Directory permissions
– Restrictions on root access
• Low-level operating system controls:
– Immutability - only change in single-user mode
– append - only add to file, except single-user mode
• Hardware controls:
– Read-only file systems (CD ROM, WORM)
– Write-protect options
95-752:6-29
Detection Strategies
• Comparison copies:
– On read-only media
– On standard media, remote storage
– Large space, slow, expensive
• Metadata:
– Stored list of files
– Path to files
– Modification times
– Easy to fool
• Digital Signature
– Encrypt with private key of modifier
– Fast, small, hard to fool, requires extra work
95-752:6-30
TRIPWIRE
• System to compute signatures on all files in
system
– Batch mode - compare against stored signatures &
report differences
– Interactive mode - compare against stored signatures &
confirm updates
– Both commercial and freeware products
• Detects:
– Corrupted file systems
– Unlogged administrator actions
– Replacement of system programs
95-752:6-31
Recovery Strategies
• Restore from backup - Rollback (Data Loss)
• If data problem, may be able to replay changes -
Selective Rollback (some data loss)
• If redundant file system, vote file versions -
Masking
• If specific changes found - correct - Roll forward
• In general -- the more detection and prevention,
the easier the recovery
95-752:6-32
Auditing
• Installing security protection is only a beginning
• Need to monitor systems
• Monitoring methods: Audits and Logs
– Audit - active scanning of current state of system
– Log - record of actions taken in operation of system
• Audits often use logs, and do more
95-752:6-33
Log File Vulnerabilities
• Alteration
– Append mode
– Non-rewritable media (print)
• Deletion
– Non-rewritable media
– Move to restricted log host
– PC linked by serial line
• Flooding
– Ensure large storage
– Reduce before logging (look for repeating patterns)
95-752:6-34
Syslog
• General purpose logging utility
• Any program can generate syslog messages
– Socket connect to syslogd process TCP port
• Messages to files, devices or computers
– Dependent on severity and service
• Messages marked with authentication level
– kern, user, mail, lpr, auth, demon, news, uucp,
local0...local7, mark
• Messages marked with priority
– emerg, alert, crit, err, warning, notice, info, debug, none
95-752:6-35
Syslog Vulnerabilities
• Network/Device flooding
• Stack overwrites (old versions)
• False log entries
• Need for consistent, frequent review
95-752:6-36
Hand-Written Logs
• Journal System
• Ensure physical protection
• “Where do you keep them?”
• Ensure legitimate entries
– Signature rules
• Keep for system
• Keep for site

More Related Content

Similar to OperatingSystem.ppt

CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
Sam Bowne
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Sam Bowne
 
Information Security
Information SecurityInformation Security
Information Security
sonykhan3
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
AmanSoni665879
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
Vincent Giersch
 
Chapter 3 access control fundamental i
Chapter 3   access control fundamental iChapter 3   access control fundamental i
Chapter 3 access control fundamental i
Syaiful Ahdan
 
Os8
Os8Os8
Os8
Os8Os8
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models
7wounders
 
Chapter02
Chapter02Chapter02
Chapter02
Chapter02Chapter02
Chapter02
kamran zamanifar
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
Sumit Tambe
 
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
James Morris
 
operating-system-03092013175227-operating-system.ppt
operating-system-03092013175227-operating-system.pptoperating-system-03092013175227-operating-system.ppt
operating-system-03092013175227-operating-system.ppt
TiktokIndia2
 
Network Implementation and Support Lesson 14 Security Features - Eric Vande...
Network Implementation and Support Lesson 14   Security Features - Eric Vande...Network Implementation and Support Lesson 14   Security Features - Eric Vande...
Network Implementation and Support Lesson 14 Security Features - Eric Vande...
Eric Vanderburg
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
Wiliam Ferraciolli
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
G Prachi
 
MySQL Security
MySQL SecurityMySQL Security
MySQL Security
Ted Wennmark
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
 

Similar to OperatingSystem.ppt (20)

CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
Information Security
Information SecurityInformation Security
Information Security
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
 
Chapter 3 access control fundamental i
Chapter 3   access control fundamental iChapter 3   access control fundamental i
Chapter 3 access control fundamental i
 
Os8
Os8Os8
Os8
 
Os8
Os8Os8
Os8
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models
 
Chapter02
Chapter02Chapter02
Chapter02
 
Chapter02
Chapter02Chapter02
Chapter02
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005Overview of NSA Security Enhanced Linux - FOSS.IN/2005
Overview of NSA Security Enhanced Linux - FOSS.IN/2005
 
operating-system-03092013175227-operating-system.ppt
operating-system-03092013175227-operating-system.pptoperating-system-03092013175227-operating-system.ppt
operating-system-03092013175227-operating-system.ppt
 
Network Implementation and Support Lesson 14 Security Features - Eric Vande...
Network Implementation and Support Lesson 14   Security Features - Eric Vande...Network Implementation and Support Lesson 14   Security Features - Eric Vande...
Network Implementation and Support Lesson 14 Security Features - Eric Vande...
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
 
MySQL Security
MySQL SecurityMySQL Security
MySQL Security
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
 

Recently uploaded

PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 

Recently uploaded (20)

PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 

OperatingSystem.ppt

  • 2. 95-752:6-2 Users • UNIX user -> username -> uid – uid is systems real name for user – integer 0 ... 65536 (varies in some systems) – mapping is in /etc/passwd shimeall:*:5003:20:Tim:/users/shimeall:csh • More than one username may map to a uid – Desired for some system purposes (program tracking) – Problem for ordinary users (confused file ownership) – Security problem (hacker makes duplicate uid account) • Temporary uid change: su
  • 3. 95-752:6-3 Groups • User - one or more groups • Group - zero or more users – Used for file permissions – Defined by /etc/groups and network sharing software – ypcat group.byname – gid - integer system name for group (generally unique) • Listed for individual users with groups • Change group of file with chgrp – chgrp newgroup myfile
  • 4. 95-752:6-4 SETUID and SETGID • Special mechanisms: temporarily use a uid or gid during the execution of a program) • Part of mode bits – s in user x field - setuid – s in group x field - setgid • To be effective, both s and x must be set – chmod a+x myprog – chmod u+s myprog – chmod 4755 myprog • WARNING: Lots of subtle security holes!
  • 5. 95-752:6-5 Dangerous Accounts • root – superuser • open, guest, play, nobody - courtesy accounts • Accounts without passwords • uucp, sync, pspq - single-command accounts • Group accounts
  • 6. 95-752:6-6 User Policy • Restricting access – commands – file access – login times – network access – terminal access • Inactive users – Detection – Password change – Locking (change shell) – Deletion (after backup) • Ultimately - need multilevel security
  • 7. 95-752:6-7 Multilevel Security • Users with different needs to know sharing computer or network • If don’t need to know – shouldn’t even be able to determine if information exists • Should be able to filter functionality based on allowable information • Mandatory and Discretionary protections
  • 8. 95-752:6-8 Monitor Model • General Schema: – Takes user's request. – Consults access control information. – Allows or disallows request. • Advantages – Easy to implement. – Easy to understand • Disadvantages – Bottleneck in system – Controls only direct accesses (not inferences)
  • 9. 95-752:6-9 Graham-Denning Model • Introduces protection rules that operate on: – A set of subjects S – A set of objects O – A set of rights R – An access control matrix Subjects S1 S2 O1 O2 s1 Control Read* Owner read s2 Control Owner
  • 10. 95-752:6-10 Graham-Denning Rights Eight primitive protection rights – create, delete object – create, delete subject – read, grant, delete, transfer access right
  • 11. 95-752:6-11 Military Security Model • Information is ranked: – Unclassified – Confidential – Secret – Top Secret • Least Privilege: Subject should have access to fewest objects needed for successful work – The system backup program may be allowed to bypass read restrictions on files, but it would not have the ability to modify files. – Need to Know”
  • 12. 95-752:6-12 Compartmentalization Information may belong to one or more compartments Compartments are used to enforce need-to-know. • Classification of Information: <rank; compartments> • Clearance: <rank; compartments> – an indication of a level of trust • A subject can access an object only if – The clearance level of the subject is at least as high as that of the information. – The subject has a need to know about all compartments for which the information is classified.
  • 13. 95-752:6-13 Information Flow Models • Acts as an intelligent filter to control the transfer of information permitted by access to a particular object. • Information flow analysis can assure that operating system modules that have access to sensitive data cannot leak that data to calling modules.
  • 14. 95-752:6-14 Bell-LaPadula Model • A formal description of the allowable paths of information flow in a secure system. – Applies only to privacy – Identifies paths that could lead to inappropriate disclosures. – Is used as the basis for the design of systems that handle data of multiple levels. – Includes both discretionary and mandatory access rules • B-LP Discretionary Access Control – Uses Access Matrix similar to Graham-Denning Model – Includes functions for dealing with the access matrix.
  • 15. 95-752:6-15 Bell-LaPadula Mandatory Controls • Fixed security classes for each subject and each object • Security classes ordered by a relation – Tranquility constraint prevents access classes of objects from changing • Simple Security Property • * Property
  • 16. 95-752:6-16 Bell-LaPadula Properties Simple Security Property: • Subject may have read access only if object classified at same level or lower. * - Property • Subject may have write access only if all objects read are at same level or higher than object to be written.
  • 17. 95-752:6-17 Biba Model • Concerned with integrity rather than secrecy. • Defines integrity levels much like sensitivity levels. – Fixed integrity classes for each subject and each object – Ordered integrity classes
  • 18. 95-752:6-18 Biba Properties Simple Integrity Property: • Subject can modify object only if integrity class at least as high as the object. (untrusted subjects reduce integrity class when writing) * - Property: • Subjects may have write access only if the integrity of objects they are reading is at least as high as the object to be written. (untrusted sources reduce integrity of results)
  • 19. 95-752:6-19 Integrity Preservation A high integrity file is one whose contents are created by high-integrity processes. • high-integrity file cannot be contaminated by information from low-integrity processes. • high-integrity process cannot be subverted by low integrity processes or data. The integrity class label on a file guarantees that the contents came only from sources of at least that degree of integrity.
  • 20. 95-752:6-20 Secure Operating Systems Basic Features of a Multiprogramming OS – Authentication of users. – Protection of memory. – File and I/O device access control. – Allocation and access control to general objects. – Enforcement of sharing. – Guarantee of fair service. – Interprocess communication and synchronization. • Basic Considerations – Security must be considered in every aspect of the design of operating systems. – It is difficult to add on security features.
  • 21. 95-752:6-21 Basic Design Principles • Least privilege - fewest possible privileges for user. • Economy of mechanism - small, simple, straight forward. • Open design • Complete mediation - check every access • Permission based - default is denial of access. • Separation of privilege - no single super user. • Least common mechanism - avoid shared objects. • Easy to use.
  • 22. 95-752:6-22 Security Kernel • Responsible for implementing the security mechanisms of the entire operating system. • Provides the security interfaces among the hardware, the operating system, and the other parts of the computing system. • Implementation of a security kernel: – May degrade system performance (one more layer). – May be large. – No guarantees.
  • 23. 95-752:6-23 Backups • First line of defense against denial-of-service and modification threats • Don’t depend on system backups for important data • User backups • Administrator backups: – Day-zero backup – Upgrade backup – Full backup – Incremental backup
  • 24. 95-752:6-24 Backup Policy • One backup volume per partition • Time backup for restoration – How much work are we willing to lose? • Verify backup at archive location – Content - not just format – Ensure operator training – Ensure archive environment • Rotate media – Need more than most recent backup • Maintain physical security on backups • Maintain logical security on backups • Be careful about legal issues on backups
  • 25. 95-752:6-25 Integrity • Compromise of integrity equal to compromise of privacy • Integrity threats: – Change permissions to allow modification/reading – Change password file – Change device / interface configurations – Move files – Replace system programs with substitutes – Replace log files with sanitized versions • 95% of UNIX security incidents result of misconfiguration
  • 26. 95-752:6-26 Integrity Protection Strategies • Prevention • Detection • Recovery
  • 27. 95-752:6-27 Unix Operation Modes • Normal Operating Mode: – Any user login – Diverse command set – Network operations – Import and export files • Single User Mode: – Intended for system maintenance / full backup – Only root login allowed – Restricted command set – No network operations – No file import/export
  • 28. 95-752:6-28 Prevention Strategies • Software Controls: – File permissions – Directory permissions – Restrictions on root access • Low-level operating system controls: – Immutability - only change in single-user mode – append - only add to file, except single-user mode • Hardware controls: – Read-only file systems (CD ROM, WORM) – Write-protect options
  • 29. 95-752:6-29 Detection Strategies • Comparison copies: – On read-only media – On standard media, remote storage – Large space, slow, expensive • Metadata: – Stored list of files – Path to files – Modification times – Easy to fool • Digital Signature – Encrypt with private key of modifier – Fast, small, hard to fool, requires extra work
  • 30. 95-752:6-30 TRIPWIRE • System to compute signatures on all files in system – Batch mode - compare against stored signatures & report differences – Interactive mode - compare against stored signatures & confirm updates – Both commercial and freeware products • Detects: – Corrupted file systems – Unlogged administrator actions – Replacement of system programs
  • 31. 95-752:6-31 Recovery Strategies • Restore from backup - Rollback (Data Loss) • If data problem, may be able to replay changes - Selective Rollback (some data loss) • If redundant file system, vote file versions - Masking • If specific changes found - correct - Roll forward • In general -- the more detection and prevention, the easier the recovery
  • 32. 95-752:6-32 Auditing • Installing security protection is only a beginning • Need to monitor systems • Monitoring methods: Audits and Logs – Audit - active scanning of current state of system – Log - record of actions taken in operation of system • Audits often use logs, and do more
  • 33. 95-752:6-33 Log File Vulnerabilities • Alteration – Append mode – Non-rewritable media (print) • Deletion – Non-rewritable media – Move to restricted log host – PC linked by serial line • Flooding – Ensure large storage – Reduce before logging (look for repeating patterns)
  • 34. 95-752:6-34 Syslog • General purpose logging utility • Any program can generate syslog messages – Socket connect to syslogd process TCP port • Messages to files, devices or computers – Dependent on severity and service • Messages marked with authentication level – kern, user, mail, lpr, auth, demon, news, uucp, local0...local7, mark • Messages marked with priority – emerg, alert, crit, err, warning, notice, info, debug, none
  • 35. 95-752:6-35 Syslog Vulnerabilities • Network/Device flooding • Stack overwrites (old versions) • False log entries • Need for consistent, frequent review
  • 36. 95-752:6-36 Hand-Written Logs • Journal System • Ensure physical protection • “Where do you keep them?” • Ensure legitimate entries – Signature rules • Keep for system • Keep for site