OS Scurity
OS Scurity
1 2
3 4
1
Security Violation Categories Malware
• Breach of confidentiality
– Unauthorized reading of data Malicious Software
• Breach of integrity (Malware)
Virus
– Unauthorized modification of data ü Computer program that is Spyware
attached to a executable file
• Breach of availability ü Needs users action
ü Secretly gathers the information
about the user activities
ü Downloads, Emails, Pen drives etc,.
– Unauthorized destruction of data Trojan Horse
5 6
Snooping
Confidentiality
“ Keeping information Secret (or) Hiding the
information”
1.
Confidentiality Message
Reads
Alice Bob
Attacks: Snooping, and Traffic Analysis
Internet
Leak
Eve
Question: How do you think attacker read/leak the messages ?
Confidentiality
“ Keeping information Secret (or) Hiding the Question: How do you think message can be kept confidential?
information”
Com plete Cybersecurity Professional Certificate Program Sateesh K um ar Peddoju, © 2020 Com plete Cybersecurity Professional Certificate Program Sateesh K um ar Peddoju, © 2020
7 7 8 8
7 8
2
Traffic Analysis
Confidentiality
“ Keeping information Secret (or) Hiding the
information”
2.
Encrypted Message
Integrity
Reads
Alice Bob Attacks: Replaying, Alteration/Modification, Masquerading, and Repudiation
Original
Analysis Message
Eve
Com plete Cybersecurity Professional Certificate Program Com plete Cybersecurity Professional Certificate Program
Sateesh K um ar Peddoju, © 2020 Sateesh K um ar Peddoju, © 2020
9 9 10 10
9 10
Replaying Alteration
E E
INT GRITY INT GRITY
100$ to Eve Bank
10$ 100$ Bank
Change
Capture
to Eve
Alice
Alice
to Eve
to Eve
100$
to Eve
100$
100$
100$
Eve
Replaying Eve
Integrity Integrity
“ Changes need to be done by an authorized user” “ Changes need to be done by an authorized user”
Com plete Cybersecurity Professional Certificate Program Sateesh K um ar Peddoju, © 2020 Com plete Cybersecurity Professional Certificate Program Sateesh K um ar Peddoju, © 2020
11 11 12 12
11 12
3
Masquerading Repudiation
E E
I am Alice INT GRITY 100$ to Bob Bank INT GRITY
Alice
Alice Bob
Bob
Eve
Integrity Integrity
“ Changes need to be done by an authorized user” “ Changes need to be done by an authorized user”
Com plete Cybersecurity Professional Certificate Program Com plete Cybersecurity Professional Certificate Program
Sateesh K um ar Peddoju, © 2020 Sateesh K um ar Peddoju, © 2020
13 13 14 14
13 14
Repudiation
E 3.
INT GRITY
Availability
I 100$
didn’ttoSend
Bob Bank
Alice
Attacks: Denial of Service
Bob
Integrity Availability
“ Changes need to be done by an authorized user” “ Available all the time to the authorized user”
Com plete Cybersecurity Professional Certificate Program Sateesh K um ar Peddoju, © 2020 Com plete Cybersecurity Professional Certificate Program Sateesh K um ar Peddoju, © 2020
15 15 16 16
15 16
4
Denial of Service Security Measure Levels
Stop
Alice • Avoid social engineering, phishing, dumpster diving
– Operating System
• Protection mechanisms, debugging
Eve – Network
Availability
“ Available all the time to the authorized user”
• Intercepted communications, interruption, DOS
• Security is as weak as the weakest link in the chain
• But can too much security be a problem?
Com plete Cybersecurity Professional Certificate Program
Sateesh K um ar Peddoju, © 2020
17 17
17 18
19 20
5
Security Kernel Why is security hard?
• Responsible for implementing the security mechanisms of
the entire operating system. • Security slows things down
• Security gets in the way
• Provides the security interfaces among the hardware, the • Security adds no value if there are no attacks
operating system, and the other parts of the computing • Only the government used to pay for security
system. – The Internet made us all potential victims
21 22
23 24
6
Authentication Aside on Encryption
• How does a computer know who I am? • Encryption: takes a key and data and creates ciphertext
– User name / password – {Attack at dawn}key=h8JkS! = 29vn	njs@a
• How do it store the password? • Decryption: takes cipertext and a key and recovers data
• How do it check the password? – {29vn	njs@a}key=h8JkS! = Attack at dawn
• How secure is a password? – Without key, can’t convert data into ciphertext or vice-versa
– Public/Private Keys
– Biometrics • Hashing: takes data and creates a fixed-size fingerprint, or hash
• What does the computer do with this information? – H(Attack at Dawn) = 183870
– Assign you an identifier – H(attack at dawn) = 465348
• Unix: 32 bit number stored in process structure – Can’t determine data from hash or find two pieces of data
with same hash
• Windows NT: 27 byte number, stored in an access token
in kernel
25 26
27 28
7
Authorization Access Control Lists
• How does the system know what I’m allowed to do? • Representation used in Windows NT, Unix for files
– Authorization matrix: • Stored on each file / directory
• Objects = things that can be accessed
• Subjects = things that can do the accessing (users or Bob Read, Write,
programs) Delete
Students Read
Everyone Read
Alice Bob Carl
/etc Read Read Read Unix:
Write Fixed set of permissions (read,write,delete)
Three sets of subjects (owner, group, world)
/homes Read Read Read
Windows NT
Write Write Write
Arbitrary number of entries
/usr None None Read
16 permissions per object
31 32
33 34
8
Modern security problems Integrity
• Confinement • Compromise of integrity equal to compromise of privacy
– How do I run code that I don’t trust?
• E.g. RealPlayer, Flash
– How do I restrict the data it can communicate? • Integrity threats:
– What if trusted code has bugs? – Change permissions to allow modification/reading
• E.g. Internet Explorer
• Concepts:
– Change password file
– Least Privilege: programs should only run with the minimal – Change device / interface configurations
amount of privilege necessary – Move files
• Solutions:
– Replace system programs with substitutes
– Restricted contexts - let the user divide their identity
– ActiveX – make code writer identify self
– Replace log files with sanitized versions
– Java – use a virtual machine that intercepts all calls
– Binary rewriting - modify the program to force it to be safe • 95% of UNIX security incidents result of misconfiguration
37 38
39 40
9
Detection Strategies Recovery Strategies
• Comparison copies:
– On read-only media • Restore from backup - Rollback (Data Loss)
– On standard media, remote storage • If data problem, may be able to replay
– Large space, slow, expensive
changes - Selective Rollback (some data
• Metadata: loss)
– Stored list of files
– Path to files
• If specific changes found - correct - Roll
– Modification times
forward
– Easy to fool • In general -- the more detection and
• Digital Signature prevention, the easier the recovery
– Encrypt with private key of modifier
– Fast, small, hard to fool, requires extra work
41 42
Auditing
End of Security
• Monitoring methods: Audits and Logs
– Audit - active scanning of current state of system
– Log - record of actions taken in operation of system
43 45
10
What we have done so far !
1. Course content (Syllabus)
– Completed + Advanced
– Books (Ref. Galvin)
– Extra references (material)
2. Remember: OS (CoA), DAA, DS, Programming
3. Teaching & Learning
– PPT (Ref. Galvin + Improvements + Detailed Discussions)
Wrap - up –
–
Tutorials (Important topics)
Reading Notes / Assignments (Advanced topics) (not forced this time).
– Quizzes (complex problems)
– MTE (much more complex problems)
– Project (not too tough, easy with a team)
• Better Experience of the concepts
– Evaluation: Fair, Balanced, and Open
4. Participation
– Excellent (cooperation, interaction, discussions)
5. Attendance
6. Personal Interactions
7. Fair & Impartial to everyone
46 47
48 49
11
THANK YOU
T
E BES
TH
ALL
e e sh
-S a t
50
12