Unix, History
|
|
- Agatha Shepherd
- 5 years ago
- Views:
Transcription
1 Operating systems Examples from Unix, VMS, Windows NT on user authentication, memory protection and file and object protection. Trusted Operating Systems, example from PitBull
2 Unix, History
3 Unix, History
4 Unix Each user has a unique id and belongs to one or more groups. Users are divided into three domains: user, group and world (all). The privileged user is called root. Runs in two modes: kernel and user.
5 User authentication The kernel itself treats users as numbers. Each user is identified by a unique integer, the user id or uid A separate database outside the kernel assigns a textual name, the user name to each user id. Other information in the database: Username Password, in an encrypted form. Numeric user id. Numeric group id. Full name or other description of account. Home directory. Login shell (program to run at login).
6 User authentication The basic user database in a Unix system is the text file, /etc/passwd (called the password file). Any user on the system may read the password file, so that they can, for example, learn the name of another user. Many Unix systems have shadow passwords. This is an alternative way of storing the password: the encrypted password is stored in a separate file, (e.g. /etc/shadow), which only root can read. The /etc/passwd file only contains a special marker in the second field. Any program that needs to verify a user is setuid, and can therefore access the shadow password file.
7 /etc/passwd examples No shadow password file: troot:lrlqho051w3c.:0:1:operator:/:/usr/local/bin/tcsh sroot:kfi6w.uvpzeng:0:1:operator:/:/bin/sh rolle:bv4vybp.fsbng:6915:43:roland Parviainen:/c8/rolle:/usr/local/bin/bash Shadow password file: root:x:0:0:root,,,:/root:/bin/bash rolle:x:501:501:roland Parviainen:/home/rolle:/bin/bash
8 Logging in Logging in from a terminal
9 File and object protection Has a single hierarchical tree structure; all of the mounted files and filesystems are presented as one integrated virtual filesystem. Devices such as soundcards, modems and floppy drives are represented by a device special files in /dev/. Example: /dev/sound Every file and directory in the virtual filesystem is represented by one inode. An inode contain, among other things, the following information: mode: describes what this inode represents as well as access rights to it. user and group ids: the owner and the group of the file.
10 File and object protection Access rights: read (r) write (w) execute (or access for directories) (x) set user or group ID on execution (s) A combination of rights can be set for each domain (user, group and world). s is only valid for user and group. Access rights also applies to device special files, e.g /dev/sound. Some Unix operating systems also has Access control lists, such as Secure HP-UX or Solaris.
11 File and object protection, example Want to give access to /dev/sound to Alice, Bob and Carol but not Dave Create a new group abc, containing Alice, Bob and Carol Change the group of /dev/sound to abc Create a group sound, change the group of /dev/sound to sound Add Alice, Bob and Carol to group sound
12 File and object protection, example cron run commands at specified times Commands to be run are stored in /var/spool/cron/, owned by root A user adds a command using the crontab command crontab need to be set uid root! drwx root root 4096 nov 19 20:01 /var/spool/cron/ -rwsr-xr-x 1 root root jul /usr/bin/crontab
13 File and object protection, example You can send a message to another user logged in using the write command The write command need to have permissions to write text to any user s text terminal write set group id tty All text terminal devices owned by group tty -rwxr-sr-x 1 root tty 7900 apr 25 15:06 /usr/bin/write crw--w rolle tty 136, 6 maj 3 19:11 /dev/pts/6
14 Memory protection Each process in the system has its own virtual address space. These virtual address spaces are completely separate from each other. Paging.
15 Memory protection Example of information in the page table (from Linux on Alpha): V: Valid FOE: "Fault on execute", Whenever an attempt to execute instructions in this page occurs, the processor reports an error and passes control to the operating system FOW: "Fault on write", As above, but an error on write FOR: "Fault on read", As abobe, but an error on read KRE: Code running in kernel mode can read this page URE: Code running in user mode can read this page KWE: Code running in kernel mode can write to this page UWE: Code running in user mode can write to this page Page frame number
16 VMS OpenVMS: originally called VMS (Virtual Memory System) First conceived in 1976 as a new operating system for Digital's new, 32-bit, virtual memory line of computers, eventually named VAX (Virtual Address extension) VMS version X0.5 was the first released to customers, in support of the hardware beta test of the VAX-11/780, in VAX/VMS Version V1.0 shipped in Now runs on Digitals (Compaq) Alpha computers. C2 Certified
17 VMS, Authentication Keeps a history of the user's passwords, which prevents the selection of passwords that have been used recently. Can be made to enforce the changing of passwords on a regular basis. A user can be forced to select a password from a randomly generated collection. A password selected by a user is checked against a list of commonly used passwords. Passwords are stored in the User Authorization File (SYS$SYSTEM:SYSUAF.DAT) using one-way encryption.
18 VMS, System architecture
19 VMS, Hardware Protection Mechanisms CHMx: x: K,E,S,U (Kernel, Executive, Supervisor, User) Kernel is the only mode with access to the full instruction set; the other three operate using the restricted subset of instructions. REI returns to the former mode. CHMx can only change inwards towards "higher" modes. REI can only change outwards towards "lower" modes. Executive: For RMS only, record managements services (handles all files on disk) Supervisor mode: For CLI, command line interface
20 VMS, Object and File protection To determine the rights a domain (i.e. user, subject), the system checks the following mechanisms in order: Access control lists User identification codes (UICs) Privileges
21 VMS, Object and File protection Read Write Execute Delete Control File Read, print or copy Write or modify Execute if program Delete Change rights Folder List all entries Create new files List specified entries Delete if empty Change rights
22 VMS, UIC Protection UIC, User Identification Code Divides the users into four domains: System, Owner, Group and World. Each user belong to one group System: a special Group System and Owner has control rights World never has control rights (System rights, Owner rights, Group Rights, World rights) E.g.: (RWED, RWE, RE, R)
23 VMS, Privilege Protection 64 bits are available for each user. Examples: SYSPRV causes the user to be treated as if the user were in the System domain. BYPASS permits unconditional and unlimited access to an object. READALL permits read and control access. When a program is run, the users privileges are merged with the privileges for the program (using OR). This provides the ability for unprivileged users to run privileged programs.
24 VAX Security Kernel Targeted at the A1 level of the TCSEC. Backwards compatible with VMS The security kernel emulated the VAX hardware, including all modes, virtual memory, I/O devices etc. Built twice during the 1980's. Terminated in 1990.
25 Windows NT Windows NT 3 Late 80's Windows NT Windows NT Windows 2000 (5.0) Feb 2000 Windows XP (5.1) Late 2001
26 Windows NT Based on a microkernel, designed to be as small as efficient as possible. Most operating services are implemented by semi-independent secondary subsystems. Two execution modes: user mode and kernel mode. Kernel mode: complete access to every system resource and of all memory.
27 NT, System architecture
28 NT, System architecture I/O Manager: controls most input and output Object Manager: creates, modifies and deletes system objects (e.g. a file or process) Security Reference Manager (SRM): grants and denies requests for access to objects and system resources by the object manager. Relies on Security Access Tokens (SATs)
29 Memory system Demand paged, virtual memory system Flat, linear 32-bit address space (up to 4 GB) Pages 4kB in size Pages in use are redirected to physical RAM
30 User authentication The privileged user is called Administrator by default (can be changed). Items may be temporarily protected against the Administrator account, but Administrator can always change their permissions to gain access. Passwords are stored in the user accounts database (Security Account Database, SAD) hashed (a one-way encryption). The SAD is managed by the security account manager (SAM). The encrypted passwords can be read by a user. Users can be forced to change their passwords after a period of time. A history of already used passwords can also be stored. Users can be locked out of the system after a certain amount of failed login attempts.
31 Local Security Authority (LSA) Validates local and remote logins Generates access tokens during the login process Manages local security policies Provides user authentication and validation Logs audiot messages generated by the SRM (Security Reference Monitor)
32 Security Reference Monitor, SRM Runs in kernel mode Responsible for checking access to objects
33 Security subsystem Security Policy Database Login process Local Security Authority Security Account Manager Audit log Security Account Database User Mode Security Reference Monitor Kernel Mode
34 User authentication The user authentication process Enter the useridand password The password is hashed (encrypted) and sent to the local security authority (LSA) LSA makes a call to SAM and compares the hash stored in the SAD. LSA creates an access token using the user's account Security ID (SID) and group SIDs. The NT explorer shell opens with the user's access token attached.
35 User authentication WinLogon (User, Password) AT Win32 subsyst. 6 7 AT 1 AT LSA 2 5 SAM 3 4 New process AT 8 Explorer AT SAD
36 Access Tokens Access tokens are created by the Local Security Authority after SAM validation, as part of a successful logon process. All processes created by the user has a copy of the token attached to it. Information in the token: User's security identifier (SID) Group security identifiers User privileges Primary Group SID (only used by the POSIX subsystem) Default ACL (assigned to any object created by the user)
37 Possible user privileges Around 30 specific 'user rights' can be assigned to users or groups. Examples: Access this computer from network Change the system time Shut down the system Not even administrators have all privileges by default
38 File and object protection The NTFS (NT File System) has some security features: Discretionary Access Control (DAC). Journaling Information about files are stored in the master file table (MFT). Examples of information: the filename, security attributes, etc. Files have only a single owner, group ownership does not exist. Access control lists (ACLs) are used to control access to files, directories and objects.
39 File protection NTFS Permission Read (R) Write (W) Execute (X) Delete (D) Change Permissions (P) Take ownership (O) delete a folder Folders Display folder names, attributes, owner & permissions Add file & folders, change a folders attribute, display owner & permissions Display folder attributes, make changes to folders within a folder, and display owner & permissions Change a folders permissions Take ownership of the folder Display file data, attributes, owner & permissions Display owner & permissions, change file attributes, create data in and append data to a file. Display file attributes, owner & permissions. Run a file if it is an executable. Delete a file File Change the permissions on the file Take ownership of a file.
40 PitBull From Argus Systems Add on to Sun Solaris and IBM AIX Has features comparable to B2 Principles: Information Compartmentalization Role Compartmentalization Least privilege Kernel-level enforcement
41 Information Compartmentalization Preventing any user (inc. root) from viewing or modifying information the user is not cleared for. Prevent compromises in one application from being used for attacks against other unrelated applications MAC, mandatory access controls Based on Sensitivity Labels - SLs. Every object has a SL (including files and processes) Some objects can have more than one SL, such as directories (to specify a range for example)
42 SLs Two components: classifications and compartments Classification - hierarchical, such as Top Secret, Secret, Confidential Compartments - non-hierarchical A SL can have any number of compartments Example: Top Secret: A, B
43 Dominance relationships Dominant, Equal and Disjoint A process can read but not write any file which it dominates but does not equal Writes are permitted if and only if the process's SL equals the file's SL Examples: A process with a Top Secret SL can read but not write a file with a Confidential SL A Top Secret: A process can neither read nor write a Confidential: A B file
44 Clearance A user have three SLs, which form the clearance of the user Minimum, default and maximum SL At login, a user get the default SL, unless an SL is requested: login: smith -e "othersl a b" Can not change SL while running without special privileges
45 Role Compartmentalization Access to a root shell should not give control of the entire system Combination of privileges and authorizations root's old "can do anything"-privilege has been divided into smaller abilities called privileges Example: Mounting filesystems, Changing MACs, etc. Authorizations are assigned to users Privileges belong to processes and executable files If a user is not authorized for a privilege, executing a privileged file will not help Different users for configuring hardware, adding users, changing MACs and SLs.
46 Least privilege A process should only have the minimum necessary privileges A user should only have the authorizations necessary to do his duties
47 Compartment A https-weba Process: Secret: Web, Server, A Compartment B https-webb Process: Secret: Web, Server, B Shared files SL: Confidential: Web, Server HTML docs for https-weba SL: Confidential: Web, A Owner: weba User weba SL: Conf.: Web, A Auths: LOGIN WEBA EXECENV HTML docs for https-webb SL: Confidential: Web, B Owner: webb User webb SL: Conf.: Web, B Auths: LOGIN WEBB EXECENV
48 PitBull Summary Complex to administer Still relies on the integrity of the kernel
49 Data base security Next time
CS 392/681 - Computer Security. Module 5 Access Control: Concepts and Mechanisms
CS 392/681 - Computer Security Module 5 Access Control: Concepts and Mechanisms Course Policies and Logistics Midterm next Thursday!!! Read Chapter 2 and 15 of text 10/15/2002 Module 5 - Access Control
More informationOperating system security models
Operating system security models Unix security model Windows security model MEELIS ROOS 1 General Unix model Everything is a file under a virtual root diretory Files Directories Sockets Devices... Objects
More informationCS 392/681 - Computer Security. Module 6 Access Control: Concepts and Mechanisms
CS 392/681 - Computer Security Module 6 Access Control: Concepts and Mechanisms Course Policies and Logistics Midterm grades Thursday. Read Chapter 2 and 15 th of text Lab 4 postponed - due next week.
More informationIS 2150 / TEL 2810 Information Security and Privacy
IS 2150 / TEL 2810 Information Security and Privacy James Joshi Professor, SIS Access Control OS Security Overview Lecture 2, Sept 6, 2016 1 Objectives Understand the basics of access control model Access
More informationOutline. Security. Security Ratings. TCSEC Rating Levels. Key Requirements for C2. Met B-Level Requirements
Outline Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Ratings System Components 2 Ratings TCSEC Rating Levels National Computer Center (NCSC) part of US Department of Defense
More informationSecurity. Outline. Security Ratings. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline Ratings System Components Logon Object (File) Access Impersonation Auditing 2 Ratings National Computer Center (NCSC) part
More informationDatasäkerhet/Data security EDA625 Lect5
Ch. 6 Unix security Datasäkerhet/Data security EDA625 Lect5 Understand the security features of a typical operating system Users/passwords login procedure user superuser (root) access control (chmod) devices,
More informationAccess Control Mechanisms
Access Control Mechanisms Week 11 P&P: Ch 4.5, 5.2, 5.3 CNT-4403: 26.March.2015 1 In this lecture Access matrix model Access control lists versus Capabilities Role Based Access Control File Protection
More informationOperating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07
0Handouts: Lesson 1 Quiz 1. What is the working definition of authentication? a. The ability for a person or system to prove identity. b. Protection of data on a system or host from unauthorized access.
More informationAccess Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger.
Access Control CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Access Control Describe the permissions available to computing processes
More informationCS 290 Host-based Security and Malware. Christopher Kruegel
CS 290 Host-based Security and Malware Christopher Kruegel chris@cs.ucsb.edu Windows Windows > 90 % of all computers run Windows when dealing with security issues, it is important to have (some) knowledge
More informationAccess Control. Steven M. Bellovin September 13,
Access Control Steven M. Bellovin September 13, 2016 1 Security Begins on the Host Even without a network, hosts must enforce the CIA trilogy Something on the host the operating system aided by the hardware
More informationIntroduction to Computer Security
Introduction to Computer Security UNIX Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Genesis: UNIX vs. MULTICS MULTICS (Multiplexed Information and Computing Service) a high-availability,
More informationProcesses are subjects.
Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path Race conditions NOTE: filenames may differ between OS/distributions Principals
More informationIT Service Delivery And Support Week Four - OS. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao
IT Service Delivery And Support Week Four - OS IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 What is an Operating System (OS)? OS is a software that designed to run on specific hardware
More informationIntroduction to Security
IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Secure Design Principles OS Security Overview Lecture 2 September 4, 2012 1 Objectives Understand the basic principles of
More informationServer. Client LSA. Winlogon LSA. Library SAM SAM. Local logon NTLM. NTLM/Kerberos. EIT060 - Computer Security 2
Local and Domain Logon User accounts and groups Access tokens Objects and security descriptors The Register Some features in Windows 7 and Windows 8 Windows XP evolved from Windows 2000 Windows 10, 8,
More informationUser accounts and authorization
User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents
More informationIntroduction to Security
IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Secure Design Principles OS Security Overview Lecture 1 September 2, 2008 1 Objectives Understand the basic principles of
More informationProtecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 10 - Identity Management and Access Control MIS5206 Week 10 Identity Management and Access Control Presentation Schedule Test Taking Tip Quiz Identity Management and
More informationCase Study: Access Control. Steven M. Bellovin October 4,
Case Study: Access Control Steven M. Bellovin October 4, 2015 1 Case Studies in Access Control Joint software development Mail Steven M. Bellovin October 4, 2015 2 Situations Small team on a single machine
More informationOutline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components
UNIX security Ulf Larson (modified by Erland Jonsson/Magnus Almgren) Computer security group Dept. of Computer Science and Engineering Chalmers University of Technology, Sweden Outline UNIX security ideas
More informationOS Security III: Sandbox and SFI
1 OS Security III: Sandbox and SFI Chengyu Song Slides modified from Dawn Song 2 Administrivia Lab2 VMs on lab machine Extension? 3 Users and processes FACT: although ACLs use users as subject, the OS
More informationModule 4: Access Control
Module 4: Access Control Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University, Jackson, MS 39232 E-mail: natarajan.meghanathan@jsums.edu Access Control In general,
More informationAccess Control (slides based Ch. 4 Gollmann)
Access Control (slides based Ch. 4 Gollmann) Preliminary Remarks Computer systems and their use have changed over the last three decades. Traditional multi-user systems provide generic services to their
More informationGeneral Access Control Model for DAC
General Access Control Model for DAC Also includes a set of rules to modify access control matrix Owner access right Control access right The concept of a copy flag (*) Access control system commands General
More informationChapter 4: Access Control
(DAC) Chapter 4: Comp Sci 3600 Security Outline (DAC) 1 2 (DAC) 3 4 5 Attribute-based control (DAC) The prevention of unauthorized use of a resource, including the prevention of use of a resource in an
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises
More informationAccess Control. Steven M. Bellovin September 2,
Access Control Steven M. Bellovin September 2, 2014 1 Security Begins on the Host Even without a network, hosts must enforce the CIA trilogy Something on the host the operating system aided by the hardware
More informationCase Studies in Access Control
Joint software development Mail 1 / 38 Situations Roles Permissions Why Enforce Access Controls? Unix Setup Windows ACL Setup Reviewer/Tester Access Medium-Size Group Basic Structure Version Control Systems
More informationOperating systems and security - Overview
Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,
More informationOperating systems and security - Overview
Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,
More informationOperating system security
Operating system security Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline Access control models in operating systems: 1. Unix 2. Windows Acknowledgements: This
More informationWhy secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem
Why secure the OS? Operating System Security Works directly on the hardware but can be adapted during runtime Data and process are directly visible Application security can be circumvented from lower layers
More informationA Survey of Access Control Policies. Amanda Crowell
A Survey of Access Control Policies Amanda Crowell What is Access Control? Policies and mechanisms that determine how data and resources can be accessed on a system. The Players Subjects Objects Semi-objects
More informationComputer Security 3e. Dieter Gollmann. Chapter 5: 1
Computer Security 3e Dieter Gollmann www.wiley.com/college/gollmann Chapter 5: 1 Chapter 5: Access Control Chapter 5: 2 Introduction Access control: who is allowed to do what? Traditionally, who is a person.
More informationIdentity, Authentication, and Access Control
Identity, Authentication, and Access Control License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
More informationPre-Assessment Answers-1
Pre-Assessment Answers-1 0Pre-Assessment Answers Lesson 1 Pre-Assessment Questions 1. What is the name of a statistically unique number assigned to all users on a Windows 2000 system? a. A User Access
More informationSMD149 - Operating Systems - File systems
SMD149 - Operating Systems - File systems Roland Parviainen November 21, 2005 1 / 59 Outline Overview Files, directories Data integrity Transaction based file systems 2 / 59 Files Overview Named collection
More informationOperating Systems Security Access Control
Authorization and access control Operating Systems Security Access Control Ozalp Babaoglu From authentication to authorization Once subjects have been authenticated, the next problem to confront is authorization
More informationAccess Control Models
Access Control Models Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Access Control Models Access Control to regulate
More informationKeys and Passwords. Steven M. Bellovin October 17,
Keys and Passwords Steven M. Bellovin October 17, 2010 1 Handling Long-Term Keys Where do cryptographic keys come from? How should they be handled? What are the risks? As always, there are tradeoffs Steven
More informationProtection. CSE473 - Spring Professor Jaeger. CSE473 Operating Systems - Spring Professor Jaeger
Protection CSE473 - Spring 2008 Professor Jaeger www.cse.psu.edu/~tjaeger/cse473-s08/ Protection Protect yourself from untrustworthy users in a common space They may try to access your resources Or modify
More informationCTEC1863/2018F Bonus Lab Page 1 of 5
CTEC1863/2018F Bonus Lab Page 1 of 5 Bonus Lab: OpenSUSE Linux Rescue In this lab, we will install an OpenSUSE virtual machine. However, both the non-root user and the root passwords are unknown. To fix
More informationHP OpenVMS CIFS File Security and Management
OpenVMS Technical Journal V14 HP OpenVMS CIFS File Security and Management Shilpa K, HP OpenVMS CIFS File Security and Management Intended Audience... 2 Introduction to CIFS... 2 The Scope:... 5 CIFS as
More informationcs642 /operating system security computer security adam everspaugh
cs642 computer security /operating system security adam everspaugh ace@cs.wisc.edu principles Principles of Secure Designs Compartmentalization / Isolation / Least privilege Defense-in-depth / Use more
More informationUsers and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.
cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and
More informationTable 12.2 Information Elements of a File Directory
Table 12.2 Information Elements of a File Directory Basic Information File Name File Type File Organization Name as chosen by creator (user or program). Must be unique within a specific directory. For
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control
More informationLast time. User Authentication. Security Policies and Models. Beyond passwords Biometrics
Last time User Authentication Beyond passwords Biometrics Security Policies and Models Trusted Operating Systems and Software Military and Commercial Security Policies 9-1 This time Security Policies and
More informationComputer Security Operating System Security & Access Control. Dr Chris Willcocks
Computer Security Operating System Security & Access Control Dr Chris Willcocks Lecture Content Access Control ACMs ACLs Introduction to *NIX security - we ll cover this more due to server popularity -
More informationData Security and Privacy. Unix Discretionary Access Control
Data Security and Privacy Unix Discretionary Access Control 1 Readings for This Lecture Wikipedia Filesystem Permissions Other readings UNIX File and Directory Permissions and Modes http://www.hccfl.edu/pollock/aunix1/filepermissions.htm
More informationDiscretionary Vs. Mandatory
Discretionary Vs. Mandatory Discretionary access controls (DAC) Privilege propagated from one subject to another Possession of an access right is sufficient to access the object Mandatory access controls
More informationCS 356 Lecture 7 Access Control. Spring 2013
CS 356 Lecture 7 Access Control Spring 2013 Review Chapter 1: Basic Concepts and Terminology Integrity, Confidentiality, Availability, Authentication, and Accountability Types of threats: active vs. passive,
More informationFile Systems. What do we need to know?
File Systems Chapter 4 1 What do we need to know? How are files viewed on different OS s? What is a file system from the programmer s viewpoint? You mostly know this, but we ll review the main points.
More informationThe landscape. File hierarchy overview. A tree structure of directories The directory tree is standardized. But varies slightly among distributions
The landscape David Morgan File hierarchy overview A tree structure of directories The directory tree is standardized But varies slightly among distributions portions can spread across different partitions
More informationDiscretionary Access Control
Operating System Security Discretionary Seong-je Cho ( 조성제 ) (sjcho at dankook.ac.kr) Fall 2018 Computer Security & Operating Systems Lab, DKU - 1-524870, F 18 Discretionary (DAC) Allows the owner of the
More informationSecurity Models Trusted Zones SPRING 2018: GANG WANG
Security Models Trusted Zones SPRING 2018: GANG WANG Access Control Slides credit to Ethan L. Miller and Scott A. Brandt Protection Domains Three protection domains Each lists objects with permitted operations
More informationLogin und Authentifizierung
Login und Authentifizierung security aspects Confidentiality: data should not be read by unauthorized parties. Integrity: data should not be changed by unauthorized parties. Availability: data should be
More informationExercise Sheet 2. (Classifications of Operating Systems)
Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user
More informationO/S & Access Control. Aggelos Kiayias - Justin Neumann
O/S & Access Control Aggelos Kiayias - Justin Neumann One system Many users Objects that require protection memory I/O devices (disks, printers) programs and processes networks stored data in general Separation
More informationSecure Architecture Principles
CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from
More informationExercise 4: Access Control and Filesystem Security
Exercise 4: Access Control and Filesystem Security Introduction Duration: 90 min Maximum Points: 30 Note: The solutions of theorethical assignments should be handed out before the practical part in the
More informationIntroduction to Computer Security
Introduction to Computer Security UNIX and Windows Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Genesis: UNIX vs. MULTICS MULTICS (Multiplexed Information and Computing Service)
More informationOperating System Security. Access control for memory Access control for files, BLP model Access control in Linux file systems (read on your own)
Operating System Security Access control for memory Access control for files, BLP model Access control in Linux file systems (read on your own) Hw1 grades out this Friday Announcement Travel: out of town
More information0Activity Answers. Table A1-1: Operating system elements and security mechanisms. The Security Accounts Manager (SAM)
Activity Answers-1 0Activity Answers Activity 1-1: Reviewing elements and mechanisms found in operating systems In this activity, you will compare Windows 2000 and Linux to discover how each implements
More informationMultifactor authentication:
Multifactor authentication: Authenticating people can be based on 2 factors: Something the user KNOWS : e.g. a password or PIN Something the user HAS: e.g. An ATM card, smartcard or hardware token, or
More informationExercises with solutions, Set 2
Exercises with solutions, Set 2 EITF55 Security, 2019 Dept. of Electrical and Information Technology, Lund University, Sweden Instructions These exercises are for self-assessment so you can check your
More informationLast time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control
Last time Security Policies and Models Bell La-Padula and Biba Security Models Information Flow Control Trusted Operating System Design Design Elements Security Features 10-1 This time Trusted Operating
More informationComputer Security. Access control. 5 October 2017
Computer Security Access control 5 October 2017 Policy and mechanism A security policy is a statement of what is, and what is not, allowed. A security mechanism is a method, tool or procedure for enforcing
More informationAccess Control. Discretionary Access Control
Access Control Discretionary Access Control 1 Outlines Access Control Discretionary Access Control (DAC) Mandatory Access Control (MAC) Role-Based Access Control (RBAC) 2 Access Control Access control
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 2.0, Last Edited 10/1/2006 Students Name: Date of Experiment: Part I: Objective The objective of the exercises
More informationCIS 5373 Systems Security
CIS 5373 Systems Security Topic 3.2: OS Security Access Control Endadul Hoque Slide Acknowledgment Contents are based on slides from Ninghui Li (Purdue), John Mitchell (Stanford), Bogdan Carbunar (FIU)
More informationSecurity Architecture
Security Architecture We ve been looking at how particular applications are secured We need to secure not just a few particular applications, but many applications, running on separate machines We need
More informationUNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan
UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication
More informationOperating Systems Design Exam 3 Review: Spring Paul Krzyzanowski
Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.
More informationIntroduction to Systems Security
Introduction to Systems Security CIM3571 Dr. S.F. Wu (wusf@vtc.edu.hk, R323, x706) Continuous Assessment 50% Examination 50% Security and Threat There are three aspects of computer security: Confidentiality
More informationNetworks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003
Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,
More informationmakes floppy bootable o next comes root directory file information ATTRIB command used to modify name
File Systems File system o Designed for storing and managing files on disk media o Build logical system on top of physical disk organization Tasks o Partition and format disks to store and retrieve information
More informationGetting Started with Linux
Getting Started with Linux For those with experience using Microsoft Windows there will be many familiar ways of operating in a Linux environment. There are also a few key differences. The main differences
More informationUnix Basics. UNIX Introduction. Lecture 14
Unix Basics Lecture 14 UNIX Introduction The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the hub of the operating system: it allocates
More informationFiles. File Structure. File Systems. Structure Terms. File Management System. Chapter 12 File Management 12/6/2018
Operating Systems: Internals and Design Principles Chapter 2 Management Ninth Edition By William Stallings s collections created by users The System is one of the most important parts of the OS to a user
More informationSysgem Enterprise Manager
Sysgem Enterprise Manager Sysgem Enterprise Manager (SEM) The Sysgem Enterprise Manager (SEM) provides companies of all sizes with a simple, powerful tool for managing IT, auditing security, administering
More informationStorage and File Hierarchy
COS 318: Operating Systems Storage and File Hierarchy Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Storage hierarchy File system
More informationFile Services. Chapter 5. Topics in this Chapter: Understanding Windows File Systems. Understanding Linux File Systems
Chapter 5 File Services Topics in this Chapter: Understanding Windows File Systems Understanding Linux File Systems Understanding Permissions Management (Access Control) Understanding File Backup, Restore,
More informationWe ve seen: Protection: ACLs, Capabilities, and More. Access control. Principle of Least Privilege. ? Resource. What makes it hard?
We ve seen: Protection: ACLs, Capabilities, and More Some cryptographic techniques Encryption, hashing, types of keys,... Some kinds of attacks Viruses, worms, DoS,... And a distributed authorization and
More informationCOS 318: Operating Systems
COS 318: Operating Systems File Systems: Abstractions and Protection Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics What s behind
More informationCSE543 - Introduction to Computer and Network Security. Module: Operating System Security
CSE543 - Introduction to Computer and Network Security Module: Operating System Security Professor Trent Jaeger 1 OS Security An secure OS should provide (at least) the following mechanisms Memory protection
More informationP1L5 Access Control. Controlling Accesses to Resources
P1L5 Access Control Controlling Accesses to Resources TCB sees a request for a resource, how does it decide whether it should be granted? Authentication establishes the source of a request Authorization
More informationBasic Linux Security. Roman Bohuk University of Virginia
Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls
More informationSecure Architecture Principles
CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from
More informationComputer Security. 04r. Pre-exam 1 Concept Review. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 04r. Pre-exam 1 Concept Review Paul Krzyzanowski Rutgers University Spring 2018 February 15, 2018 CS 419 2018 Paul Krzyzanowski 1 Key ideas from the past four lectures February 15, 2018
More informationThe Case for Security Enhanced (SE) Android. Stephen Smalley Trusted Systems Research National Security Agency
The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency Background / Motivation Increasing desire to use mobile devices throughout the US government.
More informationFreeBSD Advanced Security Features
FreeBSD Advanced Security Features Robert N. M. Watson Security Research Computer Laboratory University of Cambridge 19 May, 2007 Introduction Welcome! Introduction to some of the advanced security features
More informationLab E2: bypassing authentication and resetting passwords
Lab E2: bypassing authentication and resetting passwords TTM4175 September 7, 2015 The purpose of this lab is to learn about techniques for bypassing the authentication and access control of Windows and
More informationAccess Control. Tom Chothia Computer Security, Lecture 5
Access Control Tom Chothia Computer Security, Lecture 5 The Crypto Wars 1993-1996: Clipper chip considered in US congress and rejected. Due partly to Matt Blaze s analysis and strongly attack by John Kerry
More informationAn Overview of Security in the FreeBSD Kernel. Brought to you by. Dr. Marshall Kirk McKusick
An Overview of Security in the FreeBSD Kernel Brought to you by Dr. Marshall Kirk McKusick 2013 BSDCan Conference May 17, 2013 University of Ottawa Ottawa, Canada Copyright 2013 Marshall Kirk McKusick.
More informationCS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following:
CS 470 Spring 2018 Mike Lam, Professor Distributed Web and File Systems Content taken from the following: "Distributed Systems: Principles and Paradigms" by Andrew S. Tanenbaum and Maarten Van Steen (Chapters
More informationRID HIJACKING Maintaining Access on Windows Machines.
RID HIJACKING Maintaining Access on Windows Machines. Security Conference Bogotá, Colombia. 2018 Agenda 0x01. Exposing the RID Hijacking Attack. 0x02. Windows Logon in a nutshell. 0x03. Hijacking the RID.
More informationPrivilege Separation
What (ideas of Provos, Friedl, Honeyman) A generic approach to limit the scope of programming bugs Basic principle: reduce the amount of code that runs with special privilege without affecting or limiting
More information