Chapter 15 Security

43 624 0
Chapter 15 Security

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Chapter 15: Security Chapter 15: Security 15.2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Chapter 15: Security Chapter 15: Security  The Security Problem  Program Threats  System and Network Threats  Cryptography as a Security Tool  User Authentication  Implementing Security Defenses  Firewalling to Protect Systems and Networks  Computer-Security Classifications  An Example: Windows XP 15.3 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Objectives Objectives  To discuss security threats and attacks  To explain the fundamentals of encryption, authentication, and hashing  To examine the uses of cryptography in computing  To describe the various countermeasures to security attacks 15.4 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 The Security Problem The Security Problem  Security must consider external environment of the system, and protect the system resources  Intruders (crackers) attempt to breach security  Threat is potential security violation  Attack is attempt to breach security  Attack can be accidental or malicious  Easier to protect against accidental than malicious misuse 15.5 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Security Violations Security Violations  Categories  Breach of confidentiality  Breach of integrity  Breach of availability  Theft of service  Denial of service  Methods  Masquerading (breach authentication)  Replay attack  Message modification  Man-in-the-middle attack  Session hijacking 15.6 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Standard Security Attacks Standard Security Attacks 15.7 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Security Measure Levels Security Measure Levels  Security must occur at four levels to be effective:  Physical  Human  Avoid social engineering, phishing, dumpster diving  Operating System  Network  Security is as week as the weakest chain 15.8 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Program Threats Program Threats  Trojan Horse  Code segment that misuses its environment  Exploits mechanisms for allowing programs written by users to be executed by other users  Spyware, pop-up browser windows, covert channels  Trap Door  Specific user identifier or password that circumvents normal security procedures  Could be included in a compiler  Logic Bomb  Program that initiates a security incident under certain circumstances  Stack and Buffer Overflow  Exploits a bug in a program (overflow either the stack or memory buffers) 15.9 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 C Program with Buffer-overflow Condition C Program with Buffer-overflow Condition #include <stdio.h> #define BUFFER SIZE 256 int main(int argc, char *argv[]) { char buffer[BUFFER SIZE]; if (argc < 2) return -1; else { strcpy(buffer,argv[1]); return 0; } } 15.10 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Layout of Typical Stack Frame Layout of Typical Stack Frame [...]... denial-of-service (DDOS) come from multiple sites at once Operating System Concepts – 7th Edition, Jan 10, 2005 15. 16 Silberschatz, Galvin and Gagne ©2005 The Morris Internet Worm Operating System Concepts – 7th Edition, Jan 10, 2005 15. 17 Silberschatz, Galvin and Gagne ©2005 Cryptography as a Security Tool Broadest security tool available Source and destination of messages cannot be trusted without cryptography... System Concepts – 7th Edition, Jan 10, 2005 15. 13 Silberschatz, Galvin and Gagne ©2005 Program Threats (Cont.) Virus dropper inserts virus onto the system Many categories of viruses, literally many thousands of viruses File Boot Macro Source code Polymorphic Encrypted Stealth Tunneling Multipartite Armored Operating System Concepts – 7th Edition, Jan 10, 2005 15. 14 Silberschatz, Galvin and Gagne ©2005... Multipartite Armored Operating System Concepts – 7th Edition, Jan 10, 2005 15. 14 Silberschatz, Galvin and Gagne ©2005 A Boot-sector Computer Virus Operating System Concepts – 7th Edition, Jan 10, 2005 15. 15 Silberschatz, Galvin and Gagne ©2005 System and Network Threats Worms – use spawn mechanism; standalone program Internet worm Exploited UNIX networking features (remote access) and bugs in finger... argc, char *argv[]) { execvp(‘‘\bin\sh’’,‘‘\bin \sh’’, NULL); return 0; } Operating System Concepts – 7th Edition, Jan 10, 2005 15. 11 Silberschatz, Galvin and Gagne ©2005 Hypothetical Stack Frame After attack Before attack Operating System Concepts – 7th Edition, Jan 10, 2005 15. 12 Silberschatz, Galvin and Gagne ©2005 Program Threats (Cont.) Viruses Code fragment embedded in legitimate program Very specific... (sources) and / or receivers (destinations) of messages Based on secrets (keys) Operating System Concepts – 7th Edition, Jan 10, 2005 15. 18 Silberschatz, Galvin and Gagne ©2005 Secure Communication over Insecure Medium Operating System Concepts – 7th Edition, Jan 10, 2005 15. 19 Silberschatz, Galvin and Gagne ©2005 Encryption Encryption algorithm consists of Set of K keys Set of M Messages Set of C ciphertexts... cleartext to anyone who wants to communicate with holder of public key Operating System Concepts – 7th Edition, Jan 10, 2005 15. 24 Silberschatz, Galvin and Gagne ©2005 Encryption and Decryption using RSA Asymmetric Cryptography Operating System Concepts – 7th Edition, Jan 10, 2005 15. 25 Silberschatz, Galvin and Gagne ©2005 Cryptography (Cont.) Note symmetric cryptography based on transformations, asymmetric... Jan 10, 2005 15. 31 Silberschatz, Galvin and Gagne ©2005 Authentication (Cont.) Why authentication if a subset of encryption? Fewer computations (except for RSA digital signatures) Authenticator usually shorter than message Sometimes want authentication but not confidentiality  Signed patches et al Can be basis for non-repudiation Operating System Concepts – 7th Edition, Jan 10, 2005 15. 32 Silberschatz,... ring Even asymmetric key distribution needs care – man-in-themiddle attack Operating System Concepts – 7th Edition, Jan 10, 2005 15. 33 Silberschatz, Galvin and Gagne ©2005 Man-in-the-middle Attack on Asymmetric Cryptography Operating System Concepts – 7th Edition, Jan 10, 2005 15. 34 Silberschatz, Galvin and Gagne ©2005 Digital Certificates Proof of who or what owns a public key Public key digitally signed... Encryption algorithm is E(ke , N)(m) = mke mod N, where ke satisfies kekd mod (p− q − = 1 1)( 1) The decryption algorithm is then D(kd , N)(c) = ckd mod N Operating System Concepts – 7th Edition, Jan 10, 2005 15. 23 Silberschatz, Galvin and Gagne ©2005 Asymmetric Encryption Example For example make p = 7and q = 13 We then calculate N = 7∗13 = 91 and (p− q− = 72 1)( 1) We next select ke relatively prime to 72... Since ciphertexts are generally exposed (for example, sent on the network), it is important that it be infeasible to derive D(k) from the ciphertexts Operating System Concepts – 7th Edition, Jan 10, 2005 15. 20 Silberschatz, Galvin and Gagne ©2005 Symmetric Encryption Same key used to encrypt and decrypt E(k) can be derived from D(k), and vice versa DES is most commonly used symmetric block-encryption algorithm . Chapter 15: Security Chapter 15: Security 15. 2 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 Chapter 15: Security Chapter 15: Security  The Security. countermeasures to security attacks 15. 4 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Jan 10, 2005 The Security Problem The Security Problem  Security must consider. Threats  Cryptography as a Security Tool  User Authentication  Implementing Security Defenses  Firewalling to Protect Systems and Networks  Computer -Security Classifications  An Example: Windows XP 15. 3 Silberschatz,

Ngày đăng: 13/05/2014, 00:36

Mục lục

    C Program with Buffer-overflow Condition

    Layout of Typical Stack Frame

    A Boot-sector Computer Virus

    System and Network Threats

    The Morris Internet Worm

    Cryptography as a Security Tool

    Secure Communication over Insecure Medium

    Encryption and Decryption using RSA Asymmetric Cryptography

    Man-in-the-middle Attack on Asymmetric Cryptography

    Encryption Example - SSL

Tài liệu cùng người dùng

Tài liệu liên quan