Top Banner
1 Security and Protection Chapter 9
24

1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

1

Security and Protection

Chapter 9

Page 2: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

2

The Security EnvironmentThreats

Security goals and threats

Page 3: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

3

Basics of Cryptography

Relationship between the plaintext and the ciphertext

Page 4: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

4

• Monoalphabetic substitution– each letter replaced by different letter

• Given the encryption key, – easy to find decryption key

• Secret-key crypto called symmetric-key crypto

Secret-Key Cryptography

Page 5: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

5

Public-Key Cryptography

• All users pick a public key/private key pair– publish the public key– private key not published

• Public key is the encryption key– private key is the decryption key

Page 6: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

6

Digital Signatures

• Computing a signature block

• What the receiver gets

(b)

Page 7: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

7

Authentication Using Passwords

The use of salt to defeat precomputation of encrypted passwords

Salt Password

,

,

,

,

Page 8: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

8

Authentication Using a Physical Object

• Magnetic cards– magnetic stripe cards– chip cards: stored value cards, smart cards

Page 9: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

9

Authentication Using Biometrics

A device for measuring finger length.

Page 10: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

10

Countermeasures

• Limiting times when someone can log in

• Automatic callback at number prespecified

• Limited number of login tries

• A database of all logins

• Simple login name/password as a trap– security personnel notified when attacker bites

Page 11: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

11

Mobile Code Sandboxing

Applets can be interpreted by a Web browser

Page 12: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

12

Protection Mechanisms Protection Domains (1)

Examples of three protection domains

Page 13: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

13

Protection Domains (2)

A protection matrix

Page 14: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

14

Protection Domains (3)

A protection matrix with domains as objects

Page 15: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

15

Access Control Lists (1)

Use of access control lists of manage file access

Page 16: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

16

Access Control Lists (2)

Two access control lists

Page 17: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

17

Capabilities (1)

Each process has a capability list

Page 18: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

18

• Cryptographically-protected capability

• Generic Rights1. Copy capability

2. Copy object

3. Remove capability

4. Destroy object

Capabilities (2)

Server Object Rights f(Objects, Rights, Check)

Page 19: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

19

Windows NT(W2K) Security

• Access Control Scheme– name/password– access token associated with each process

object indicating privileges associated with a user

– security descriptor• access control list

• used to compare with access control list for object

Page 20: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

20

Access Token (per user/subject)

Security ID (SID)

Group SIDs

Privileges

Default Owner

Default ACL

Page 21: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

21

Security Descriptor (per Object)

Flags

Owner

System Access Control List(SACL)

Discretionary Access ControlList (DACL)

Page 22: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

22

Access Control List

ACL Header

ACE Header

Access Mask

SID

ACE Header

Access Mask

SID

.

.

.

Page 23: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

23

Access Mask

Generic AllGeneric ExecuteGeneric WriteGeneric Read

Access System Security

Maximum allowed

DeleteRead Control

Write DACWrite OwnerSynchronizeGeneric

Access Types

StandardAccess Types

Specific Access Types

Page 24: 1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.

24

Access Control Using ACLs

• When a process attempts to access an object, the object manager in W2K executive reads the SID and group SIDs from the access token and scans down the object’s DACL.

• If a match is found in SID, then the corresponding ACE Access Mask provides the access rights available to the process.