+ All Categories
Home > Documents > Chapter 4 (Part 1) Network Security

Chapter 4 (Part 1) Network Security

Date post: 22-Feb-2016
Category:
Upload: aleda
View: 62 times
Download: 0 times
Share this document with a friend
Description:
Chapter 4 (Part 1) Network Security. Chapter 4 – Protection in General-Purpose Operating Systems Section 4.1 Protected Objects and Methods of Protection Section 4.2 Memory and Address Protection 4.3 Control of Access to General Objects 4.4 File Protection Mechanisms. In this Section. - PowerPoint PPT Presentation
22
Chapter 4 (Part 1) Network Security Chapter 4 – Protection in General-Purpose Operating Systems Section 4.1 Protected Objects and Methods of Protection Section 4.2 Memory and Address Protection 4.3 Control of Access to General Objects 4.4 File Protection Mechanisms
Transcript
Page 1: Chapter  4  (Part  1) Network Security

Chapter 4 (Part 1)Network Security

Chapter 4 – Protection in General-Purpose Operating Systems

Section 4.1 Protected Objects and Methods of ProtectionSection 4.2 Memory and Address Protection

4.3 Control of Access to General Objects4.4 File Protection Mechanisms

Page 2: Chapter  4  (Part  1) Network Security

In this SectionMemory Protection

FenceBase/BoundSegmentationPageSegmentation/Page

Object ControlDirectoryAccess Control ListAccess Control MatrixKerberos

File Protection Mechanisms

Page 3: Chapter  4  (Part  1) Network Security

Protection in General-Purpose OSSome program are insecure just based upon the

nature of the programProblem Children: Operating Systems and Databases

(require access by many different “privileged” users)OS General Goal: Controlling Shared Access and

Interface.OS Function (each have much security concern)

Access ControlIdentification and CredentialsInformation flow

Need to separate levels of security for particular users

Page 4: Chapter  4  (Part  1) Network Security

Projected Objects and Methods of Protection

In the beginning there was no OS…. Programs were just inputted – cards/switches and the human hand were the OS

Early OS was just a utility called an executive and only handled a single user - system resources managed by user

Multiprogrammed OS allowed for more than one user – system resources managed by the monitor

Early day protection was easy – you protected the user from themselves but today you must protect all users of an OS from each other and Malory

Page 5: Chapter  4  (Part  1) Network Security

Protected ObjectsIn a multiprogram environment many objects

need protection:MemorySharable I/O devicesSerially/Parallel reusable I/O devicesSharable programs and subproceduresNetworksSharable Data

Notice the single correlation of all these “Shared”

Page 6: Chapter  4  (Part  1) Network Security

Security Methods of Operating SystemsBasis of protections is separation (keeping

user objects away from other users)Methods of Separation:

Physical – nothing sharedTemporal – operating things a different timesLogical – running together but can’t access

each otherCryptographic - running together but

concealed

Page 7: Chapter  4  (Part  1) Network Security

Levels of Share Protection Do not Prevent – no protection when procedure are being run

at different timesIsolate – running concurrently but aware of each other;

separate space, objects and filesShare all or share nothing – owner of objects declare it

public or private (all or none)Share via access limitation – each user is checked for access

availability of an objectShare by compatibilities- dynamic creation of shared objectsLimit use of an object- user has varying access to an object

Each has a varying level of granularity - Greater granularity creates greater access control

Page 8: Chapter  4  (Part  1) Network Security

Fence/Fence Register – Memory and Address Protection

Simplest of all protectionConfine the user to one side of a boundaryUsed to separate OS and Program (wasteful use of space)Protects a user from an OS but not a user from another user

Page 9: Chapter  4  (Part  1) Network Security

Base/Bound RegisterCreated for a multiuser environmentBase Register – variable fence register (lower bound)Bound Register – the upper address limit

Page 10: Chapter  4  (Part  1) Network Security

Tagged ArchitectureIn base/bound, it is an all or nothing on the sharing of data. It

is hard to manage because of it contiguous data space.Tagged Architecture- every word of machine memory has

one extra bits to identify access right

Page 11: Chapter  4  (Part  1) Network Security

Segmentation Segmentation – notion of dividing a program into

separate pieces – each has a logical unityCode for a procedure, sub procedure, array Unlimited number of base/bound registers <name, offset>

Page 12: Chapter  4  (Part  1) Network Security

SegmentationSegment Address Table is created for each

program used to determine the true memory address of an instruction or data

Page 13: Chapter  4  (Part  1) Network Security

PagingProgram divided into equal size chunks called pages and

inserted into page frames; <page, offset>Unlike segmentation all pages are the same size removing

most fragmentation slight sifting of data can cause security problems

Page 14: Chapter  4  (Part  1) Network Security

Paging-SegmentationCombing the benefits of Paging and

Segmentation

Page 15: Chapter  4  (Part  1) Network Security

Control of Access to General ObjectObjects to Protect

MemoryFile or data on storage deviceExecuting program in memoryDirectory of filesHardware deviceData structureTables of the OSInstructions, privileged instructionsPasswords - AuthenticationThe protection mechanism

Page 16: Chapter  4  (Part  1) Network Security

Goals to Protecting ObjectsCheck every access – able to revoke a right

to an object

Enforce least privilege – user/object should have access to the smallest number of objects necessary to perform some task

Verify acceptable usage – Not just access an object but check to see if its use of the object is acceptable

Page 17: Chapter  4  (Part  1) Network Security

Directory AccessEach user has a list to determine access to an objectProblem – large lists, revocation of access, and multiple entries of the

same name

Page 18: Chapter  4  (Part  1) Network Security

Access Control ListA single list for each objectLots of advantages over Directory Access

Page 19: Chapter  4  (Part  1) Network Security

Access Control MatrixEach row represents a subject and each

column represents a object. Each entry is the set of access rights

Table 4-1 in textbook

Page 20: Chapter  4  (Part  1) Network Security

CapabilityCapability is an unforgettable token that gives rights to

an objectSometimes a user must have a ticket; Domain useage

Page 21: Chapter  4  (Part  1) Network Security

KerberosKerberos is an implementation of a ticket

based system with authenticationAuthentication Server (AS) – authenticates

the userTicket Granting Server (TGS) – provides the

ticketKey Distribution Center (KDC) – is made up

of the AS and TGS

Page 22: Chapter  4  (Part  1) Network Security

File Protection MechanismsAll-None System (Unacceptable)

Lack of TrustToo CourseRise of SharingComplexityFile Listings

Group Protection (has problems)Group AffiliationMultiple PersonalitiesAll GroupsLimited Sharing


Recommended