












Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A comprehensive overview of operating system security, covering key concepts, threats, and techniques. It delves into various security violation categories, methods, and program and network threats. The document also explores security measures at different levels, including physical, human, operating system, and network security. It examines various security techniques such as authentication, access control, intrusion detection, and virus protection. Finally, it discusses cryptography as a security tool, including symmetric and asymmetric encryption.
Typology: Slides
1 / 20
This page cannot be seen from the preview
Don't miss anything!
Operating System Concepts – 9th^ Edition Silberschatz, Galvin and Gagne ©
(^) Security Problem (^) Security Violation Categories (^) Security Violation Methods (^) Program and network threats (^) Security techniques (^) Cryptography: a security tool
(^) Breach of confidentiality (^) Unauthorized reading of data (^) Breach of integrity (^) Unauthorized modification of data (^) Breach of availability (^) Unauthorized destruction of data (^) Theft of service (^) Unauthorized use of resources (^) Denial of service (DOS) (^) Prevention of legitimate use
(^) Masquerading (breach authentication ) (^) Pretending to be an authorized user to escalate privileges (^) Replay attack (^) Data transmission is maliciously repeated (^) Man-in-the-middle attack (^) Intruder sits in data flow, masquerading as sender to receiver and vice versa (^) Session hijacking (^) Intercept an already-established session to bypass authentication
(^) Impossible to have absolute security, but make sufficiently high cost to deter most intruders (^) Security must occur at four levels to be effective: (^) Physical (^) Data centers, servers, connected terminals (^) Human (^) Avoid social engineering , phishing , (^) Operating System (^) Protection mechanisms, debugging (^) Network (^) Intercepted communications, interruption, DOS
(^) Many variations, many names (^) Trojan Horse (^) malware which misleads users of its true intent (^) Spyware , pop-up browser windows (^) Trap Door (^) Software bug or undocumented feature left intentionally by the programmer (^) Can be used later to get access to the system (^) Could be included in a compiler (^) Difficult to detect
computer to computer across network connections.
attack
services
(^) process of verifying an identity claimed by a system entity
(^) Password based authentication (^) Token based authentication (^) Biometric authentication
(^) Antivirus approach: use antivirus to protect the system (^) Antivirus works in following steps (^) Detect (^) Identify (^) removal
parties or the public from reading private messages (^) Source and destination of messages on network cannot be trusted without cryptography (^) a sender can encode its message so that only a computer with a certain key can decode the message (^) enables a recipient of a message to verify that the message was created by whom
Encryption (Cont.)
(^) Same key used to encrypt and decrypt (^) Therefore k must be kept secret (^) DES was most commonly used symmetric block-encryption algorithm (created by US Govt) (^) Encrypts a block of data at a time (^) Keys too short so now considered insecure
Asymmetric Encryption (^) Public-key encryption based on each user having two keys: (^) public key – published key used to encrypt data (^) private key – key known only to individual user used to decrypt data