0% found this document useful (0 votes)
95 views22 pages

System Protection and Security

The document discusses system protection and security. It covers goals of protection like preventing unauthorized access. Principles of protection like least privilege and access control methods are explained. System security threats from programs, networks and solutions like cryptography and user authentication are described. Computer security classifications and case studies of Linux and Windows are mentioned.

Uploaded by

kingbeats492
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views22 pages

System Protection and Security

The document discusses system protection and security. It covers goals of protection like preventing unauthorized access. Principles of protection like least privilege and access control methods are explained. System security threats from programs, networks and solutions like cryptography and user authentication are described. Computer security classifications and case studies of Linux and Windows are mentioned.

Uploaded by

kingbeats492
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Operating Systems

UNIT – V

SHAIK VAHIDA 2/24/2022


UNIT -V

System Protection: Goals of protection, Principles and domain of


protection, Access matrix, Access control, Revocation of access rights.
System Security: Introduction, Program threats, System and network
threats, Cryptography for security, User authentication, Implementing
security defenses, Firewalling to protect systems and networks,
Computer security classification.
Case Studies: Linux, MicrosoftWindows.
SHAIK VAHIDA 2/24/2022
System Protection
Protection refers to a mechanism which controls the access of
programs, processes, or users to the resources defined by a
computer system.
Need of Protection:
 To prevent the access of unauthorized users
 To ensure that each active programs or processes in the system.
 To improve reliability by detecting errors.

SHAIK VAHIDA 2/24/2022


Goals of Protection
 prevent malicious misuse of the system by users or programs.
 To ensure that each shared resource is used only in accordance
with system policies.
 To ensure that errant programs cause the minimal amount of
damage possible.
 protection systems only provide the mechanisms for enforcing
policies and ensuring reliable systems.

SHAIK VAHIDA 2/24/2022


Principles of Protection
 The principle of least privilege dictates that programs, users,
and systems be given just enough privileges to perform their
tasks.
 This ensures that failures do the least amount of harm and allow
the least of harm to be done.
 For example, if a program needs special privileges to
perform a task, it is better to make it a SGID program
with group ownership of "network" or "backup”.
 Typically each user is given their own account, and has only
enough privilege to modify their own files.
 The root account should not be used for normal day to day
activities .

SHAIK VAHIDA 2/24/2022


Domain of Protection
 A computer can be viewed as a collection of processes and objects (
both HW & SW ).
Domain Structure
A domain is defined as a set of < object, { access right set } > pairs,
as shown below. Note that some domains may be disjoint while
others overlap.

SHAIK VAHIDA 2/24/2022


Access Matrix
 The model of protection that can be viewed as an access
matrix, in which columns represent different system resources
and rows represent different protection domains.
 Entries within the matrix indicate what access that domain
has to that resource.

SHAIK VAHIDA 2/24/2022


 Domain switching can be easily supported under this model,
simply by providing "switch" access to other domains

SHAIK VAHIDA 2/24/2022


Implementation of Access Matrix
 Global Table
 Access Lists for Objects
 Capability Lists for Domains
 A Lock-Key Mechanism
 Comparison

SHAIK VAHIDA 2/24/2022


Access Control
 Role-Based Access Control, RBAC,assigns privileges to users,
programs. where "privileges" refer to the right to call certain
system calls, or to use certain parameters with those calls.
Role-based access control in Solaris 10

SHAIK VAHIDA 2/24/2022


Revocation of Access Rights
The need to revoke access rights dynamically raises several
questions:
 Immediate versus delayed
 Selective versus general
 Partial versus total
 Temporary versus permanent

SHAIK VAHIDA 2/24/2022


System Security
Security refers to providing a protection system to
computer system resources such as CPU, memory,
disk, software programs and most
importantly data/information stored in the
computer system.
 Authentication
 One Time passwords

SHAIK VAHIDA 2/24/2022


Program Threats
If a user program made these process do malicious tasks, then it is
known as ProgramThreats.
example of program threat is a program installed in a computer
which can store and send user credentials via network to some
hacker.
 Trojan Horse program traps user login credentials and stores
them to send to malicious user.
 Trap Door perform illegal action without knowledge of user.
 Logic Bomb when a program misbehaves only when certain
conditions met otherwise it works as a genuine program.
 Virus replicate themselves on computer system. They are highly
dangerous and can modify/delete user files, crash systems.

SHAIK VAHIDA 2/24/2022


System AND Network Threats
System and network threats refers to misuse of system services and
network connections to put user in trouble.
System threats can be used to launch program threats on a complete
network called as program attack.
 Worm − A Worm process generates its multiple copies where each
copy uses system resources, prevents all other processes to get
required resources.Worms processes can even shut down an entire
network.
 Port Scanning − Port scanning is a mechanism or means by which a
hacker can detects system vulnerabilities to make an attack on the system.
 Denial of Service − Denial of service attacks normally prevents user
to make legitimate use of the system. For example, a user may not be able
to use internet if denial of service attacks browser's content settings.

SHAIK VAHIDA 2/24/2022


Computer Security Classifications
 As per the U.S. Department of Defence Trusted Computer
System's Evaluation Criteria there are four security
classifications in computer systems:A, B, C, and D.

SHAIK VAHIDA 2/24/2022


Cryptography for security
Cryptography is technique of securing information and
communications through use of codes, so that only those person
for whom the information is intended can understand it and
process it.
Thus preventing unauthorized access to information.

SHAIK VAHIDA 2/24/2022


Features Of Cryptography are as follows:
 Confidentiality:
Information can only be accessed by the person for whom it is
intended and no other person except him can access it.
 Integrity:
Information cannot be modified in storage or transition between
sender and intended receiver.
 Non-repudiation:
The sender of information cannot deny his intention to send
information at later stage.
 Authentication:
The identities of sender and receiver are confirmed. As well as
destination/origin of information is confirmed.

SHAIK VAHIDA 2/24/2022


Types Of Cryptography:
In general there are three types Of cryptography:
1. Symmetric Key Cryptography
2. Hash Functions
3. Asymmetric Key Cryptography
 Symmetric Key Cryptography:
It is an encryption system where the sender and receiver of message use
a single common key to encrypt and decrypt messages.
Symmetric Key Systems are faster and simpler.
 Hash Functions:
There is no usage of any key in this algorithm.
A hash value with fixed length is calculated as per the plain text which
makes it impossible for contents of plain text to be recovered.
Many operating systems use hash functions to encrypt passwords.
SHAIK VAHIDA 2/24/2022
 Asymmetric Key Cryptography:
Under this system a pair of keys is used to encrypt and decrypt
information.
A public key is used for encryption and a private key is used for
decryption.
Public key and Private Key are different.

SHAIK VAHIDA 2/24/2022


User authentication
 User authentication process is used to identify who the owner
is or who the identified person is.
 In personal computer, generally, user authentication can be
perform using password.
User can be authenticated through one of the
following way:
 User authentication using password
 User authentication using physical object
 User authentication using biometric
 User authentication using countermeasures

SHAIK VAHIDA 2/24/2022


User authentication using password
 Password should be minimum of eight characters
 Password should contain both uppercase and lowercase letters
 Password should contain at least one digit and one special characters
 Don't use dictionary words and known name such as stick, mouth, sun, albert
etc.
User authentication using physical object
Here, physical object may refer to Bank's Automated Teller Machine (ATM) card
or any other plastic card that is used to authenticate.
User authentication using biometric
 This method measures the physical characteristics of the user that are very
hard to forge. These are called as biometrics.
 User authentication using biometric's example is a fingerprint, voiceprint, or
retina scan reader in the terminal could verify the identity of the user.

SHAIK VAHIDA 2/24/2022


User authentication using countermeasures
 For example, a company could have their policy that the employee
working in the Computer Science (CS) department are only allowed to
log in from 10 A.M. to 4 P.M., Monday to Saturday, and then only from
a machine in the CS department connected to company's Local Area
Network (LAN).
 Now, any attempt to log in by a CS department employee at any wrong
time or from any wrong place would be treated or handled as an
attempted break in and log in failure.

SHAIK VAHIDA 2/24/2022

You might also like