Top Banner
Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings
32

Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Chapter 15Computer Security Techniques

Patricia RoyManatee Community College, Venice, FL

©2008, Prentice Hall

Operating Systems:Internals and Design Principles, 6/E

William Stallings

Page 2: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Authentication

• Basis for most type of access control and accountability

• Identification step• Verification step

Page 3: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Password-Based Authentication

• ID– Determines if use authorized to access system– Determines privileges for user– Discretionary access control

Page 4: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

UNIX Password Scheme

Page 5: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

UNIX Password Scheme

Page 6: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Token-Based Authentication

• User posses object• Memory cards• Smart cards

Page 7: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Biometric Authentication

• Facial characteristics• Fingerprints• Hand geometry• Retinal pattern

Page 8: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Biometric Authentication

• Iris• Signature• Voice

Page 9: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Cost versus Accuracy

Page 10: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Access Control

• Discretionary access control– Based on identity of requestor

• Mandatory access control– Based on comparing security labels with security

clearances

• Role-based access control– Based on roles user has in system

Page 11: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Extended Access Control Matrix

Page 12: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Organization of the Access Control Function

Page 13: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.
Page 14: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Users, Roles, and Resources

Page 15: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Access Control Matrix Representation of RBAC

Page 16: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Access Control Matrix Representation of RBAC

Page 17: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Intrusion Detection

• Host-based• Network-based

Page 18: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Intrusion Detection

• Sensors– Collect data

• Analyzers• User interface

Page 19: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Profiles of Behavior of Intruders and Authorized Users

Page 20: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Host-Based IDSs

• Anomaly detection– Collection of data relating to behavior of

legitimated users over time

• Signature detection– Define set of rules or attack patters

Page 21: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Audit Records

• Native audit records– Operating system accounting software

• Detection-specific audit records– Generate audit records required by the IDS

Page 22: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Antivirus Approaches

• Detection• Identification• Removal

Page 23: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Generic Decryption

• CPU emulator• Virus signature scanner• Emulation control module

Page 24: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Digital Immune System

Page 25: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Behavior-Blocking Software Operation

Page 26: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Worm Countermeasures

• Signature-based worm scan filters• Filter-based worm containment• Payload-classification-based worm

containment

Page 27: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Worm Countermeasures

• Threshold random walk scan detection• Rate limiting• Rate halting

Page 28: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Buffer Overflow

• Compile-time defenses• Stack protection mechanisms

Page 29: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Buffer Overflow

• Run-time defenses• Executable address space protection• Address space randomization• Guard pages

Page 30: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Windows Vista Security

• Access control scheme– Access token– Indicates privileges

Page 31: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Windows Security Structures

Page 32: Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.

Access Mask