Operating System Concepts - Chapter 15: Security pdf

43 587 0
Operating System Concepts - Chapter 15: Security pdf

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Chapter 15: Security Chapter 15: Security 15.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Chapter 15: Security Chapter 15: Security  The Security Problem  Program Threats  System and Network Threats  Cryptography as a Security Tool  User Authentication  Implementing Security Defenses  Firewalling to Protect Systems and Networks  Computer-Security Classifications  An Example: Windows XP 15.3 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Objectives Objectives  To discuss security threats and attacks  To explain the fundamentals of encryption, authentication, and hashing  To examine the uses of cryptography in computing  To describe the various countermeasures to security attacks 15.4 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 The Security Problem The Security Problem  Security must consider external environment of the system, and protect the system resources  Intruders (crackers) attempt to breach security  Threat is potential security violation  Attack is attempt to breach security  Attack can be accidental or malicious  Easier to protect against accidental than malicious misuse 15.5 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Security Violations Security Violations  Categories z Breach of confidentiality z Breach of integrity z Breach of availability z Theft of service z Denial of service  Methods z Masquerading (breach authentication) z Replay attack  Message modification z Man-in-the-middle attack z Session hijacking 15.6 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Standard Security Attacks Standard Security Attacks 15.7 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Security Measure Levels Security Measure Levels  Security must occur at four levels to be effective: z Physical z Human  Avoid social engineering, phishing, dumpster diving z Operating System z Network  Security is as week as the weakest chain 15.8 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Program Threats Program Threats  Trojan Horse z Code segment that misuses its environment z Exploits mechanisms for allowing programs written by users to be executed by other users z Spyware, pop-up browser windows, covert channels  Trap Door z Specific user identifier or password that circumvents normal security procedures z Could be included in a compiler  Logic Bomb z Program that initiates a security incident under certain circumstances  Stack and Buffer Overflow z Exploits a bug in a program (overflow either the stack or memory buffers) 15.9 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 C Program with Buffer C Program with Buffer - - overflow Condition overflow Condition #include <stdio.h> #define BUFFER SIZE 256 int main(int argc, char *argv[]) { char buffer[BUFFER SIZE]; if (argc < 2) return -1; else { strcpy(buffer,argv[1]); return 0; } } 15.10 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Layout of Typical Stack Frame Layout of Typical Stack Frame [...]... patches et al Can be basis for non-repudiation Operating System Concepts – 7th Edition, Jan 10, 2005 15.32 Silberschatz, Galvin and Gagne ©2005 Key Distribution Delivery of symmetric key is huge challenge Sometimes done out-of-band Asymmetric keys can proliferate – stored on key ring Even asymmetric key distribution needs care – man-in-themiddle attack Operating System Concepts – 7th Edition, Jan 10,... message-digest functions include MD5, which produces a 128-bit hash, and SHA-1, which outputs a 160-bit hash Operating System Concepts – 7th Edition, Jan 10, 2005 15.29 Silberschatz, Galvin and Gagne ©2005 Authentication - MAC Symmetric encryption used in message-authentication code (MAC) authentication algorithm Simple example: MAC defines S(k)(m) = f (k, H(m)) Where f is a function that is one-way... from doing any useful work Distributed denial-of-service (DDOS) come from multiple sites at once Operating System Concepts – 7th Edition, Jan 10, 2005 15.16 Silberschatz, Galvin and Gagne ©2005 The Morris Internet Worm Operating System Concepts – 7th Edition, Jan 10, 2005 15.17 Silberschatz, Galvin and Gagne ©2005 Cryptography as a Security Tool Broadest security tool available Source and destination... NULL); return 0; } Operating System Concepts – 7th Edition, Jan 10, 2005 15.11 Silberschatz, Galvin and Gagne ©2005 Hypothetical Stack Frame After attack Before attack Operating System Concepts – 7th Edition, Jan 10, 2005 15.12 Silberschatz, Galvin and Gagne ©2005 Program Threats (Cont.) Viruses Code fragment embedded in legitimate program Very specific to CPU architecture, operating system, applications... Boot Macro Source code Polymorphic Encrypted Stealth Tunneling Multipartite Armored Operating System Concepts – 7th Edition, Jan 10, 2005 15.14 Silberschatz, Galvin and Gagne ©2005 A Boot-sector Computer Virus Operating System Concepts – 7th Edition, Jan 10, 2005 15.15 Silberschatz, Galvin and Gagne ©2005 System and Network Threats Worms – use spawn mechanism; standalone program Internet worm Exploited... to have vulnerabilities Encrypts/decrypts a stream of bytes (i.e wireless transmission) Key is a input to psuedo-random-bit generator Generates an infinite keystream Operating System Concepts – 7th Edition, Jan 10, 2005 15.21 Silberschatz, Galvin and Gagne ©2005 Asymmetric Encryption Public-key encryption based on each user having two keys: public key – published key used to encrypt data private key... private key Public key can be distributed in cleartext to anyone who wants to communicate with holder of public key Operating System Concepts – 7th Edition, Jan 10, 2005 15.24 Silberschatz, Galvin and Gagne ©2005 Encryption and Decryption using RSA Asymmetric Cryptography Operating System Concepts – 7th Edition, Jan 10, 2005 15.25 Silberschatz, Galvin and Gagne ©2005 Cryptography (Cont.) Note symmetric... CreateObject(’’Scripting.FileSystemObject’’) vs = Shell(’’c:command.com /k format c:’’,vbHide) End Sub Operating System Concepts – 7th Edition, Jan 10, 2005 15.13 Silberschatz, Galvin and Gagne ©2005 Program Threats (Cont.) Virus dropper inserts virus onto the system Many categories of viruses, literally many thousands of viruses File Boot Macro Source code Polymorphic Encrypted Stealth Tunneling Multipartite Armored Operating. .. cryptography Means to constrain potential senders (sources) and / or receivers (destinations) of messages Based on secrets (keys) Operating System Concepts – 7th Edition, Jan 10, 2005 15.18 Silberschatz, Galvin and Gagne ©2005 Secure Communication over Insecure Medium Operating System Concepts – 7th Edition, Jan 10, 2005 15.19 Silberschatz, Galvin and Gagne ©2005 Encryption Encryption algorithm consists of... Even asymmetric key distribution needs care – man-in-themiddle attack Operating System Concepts – 7th Edition, Jan 10, 2005 15.33 Silberschatz, Galvin and Gagne ©2005 Man-in-the-middle Attack on Asymmetric Cryptography Operating System Concepts – 7th Edition, Jan 10, 2005 15.34 Silberschatz, Galvin and Gagne ©2005 Digital Certificates Proof of who or what owns a public key Public key digitally signed . Chapter 15: Security Chapter 15: Security 15.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Chapter 15: Security Chapter 15: Security  The Security. modification z Man-in-the-middle attack z Session hijacking 15.6 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Standard Security Attacks Standard Security. Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 A Boot A Boot - - sector Computer Virus sector Computer Virus 15.16 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts

Ngày đăng: 28/06/2014, 02:20

Từ khóa liên quan

Mục lục

  • Chapter 15: Security

  • Chapter 15: Security

  • Objectives

  • The Security Problem

  • Security Violations

  • Standard Security Attacks

  • Security Measure Levels

  • Program Threats

  • C Program with Buffer-overflow Condition

  • Layout of Typical Stack Frame

  • Modified Shell Code

  • Hypothetical Stack Frame

  • Program Threats (Cont.)

  • Program Threats (Cont.)

  • A Boot-sector Computer Virus

  • System and Network Threats

  • The Morris Internet Worm

  • Cryptography as a Security Tool

  • Secure Communication over Insecure Medium

  • Encryption

Tài liệu cùng người dùng

Tài liệu liên quan