ch15.ppt

43 400 0
ch15.ppt

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Chapter 15: Security Chapter 15: Security 15.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Chapter 15: Security Chapter 15: Security ■ The Security Problem ■ Program Threats ■ System and Network Threats ■ Cryptography as a Security Tool ■ User Authentication ■ Implementing Security Defenses ■ Firewalling to Protect Systems and Networks ■ Computer-Security Classifications ■ An Example: Windows XP 15.3 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Objectives Objectives ■ To discuss security threats and attacks ■ To explain the fundamentals of encryption, authentication, and hashing ■ To examine the uses of cryptography in computing ■ To describe the various countermeasures to security attacks 15.4 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 The Security Problem The Security Problem ■ Security must consider external environment of the system, and protect the system resources ■ Intruders (crackers) attempt to breach security ■ Threat is potential security violation ■ Attack is attempt to breach security ■ Attack can be accidental or malicious ■ Easier to protect against accidental than malicious misuse 15.5 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Security Violations Security Violations ■ Categories ● Breach of confidentiality ● Breach of integrity ● Breach of availability ● Theft of service ● Denial of service ■ Methods ● Masquerading (breach authentication) ● Replay attack  Message modification ● Man-in-the-middle attack ● Session hijacking 15.6 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Standard Security Attacks Standard Security Attacks 15.7 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Security Measure Levels Security Measure Levels ■ Security must occur at four levels to be effective: ● Physical ● Human  Avoid social engineering, phishing, dumpster diving ● Operating System ● Network ■ Security is as week as the weakest chain 15.8 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Program Threats Program Threats ■ Trojan Horse ● Code segment that misuses its environment ● Exploits mechanisms for allowing programs written by users to be executed by other users ● Spyware, pop-up browser windows, covert channels ■ Trap Door ● Specific user identifier or password that circumvents normal security procedures ● Could be included in a compiler ■ Logic Bomb ● Program that initiates a security incident under certain circumstances ■ Stack and Buffer Overflow ● Exploits a bug in a program (overflow either the stack or memory buffers) 15.9 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 C Program with Buffer-overflow Condition C Program with Buffer-overflow Condition #include <stdio.h> #define BUFFER SIZE 256 int main(int argc, char *argv[]) { char buffer[BUFFER SIZE]; if (argc < 2) return -1; else { strcpy(buffer,argv[1]); return 0; } } 15.10 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Layout of Typical Stack Frame Layout of Typical Stack Frame

Ngày đăng: 16/07/2014, 04:00

Mục lục

  • C Program with Buffer-overflow Condition

  • Layout of Typical Stack Frame

  • A Boot-sector Computer Virus

  • System and Network Threats

  • The Morris Internet Worm

  • Cryptography as a Security Tool

  • Secure Communication over Insecure Medium

  • Encryption and Decryption using RSA Asymmetric Cryptography

  • Man-in-the-middle Attack on Asymmetric Cryptography

  • Encryption Example - SSL

  • Firewalling to Protect Systems and Networks

  • Network Security Through Domain Separation Via Firewall

Tài liệu cùng người dùng

Tài liệu liên quan