Operating System and Computer Security (Short - Note)
Operating System and Computer Security (Short - Note)
Computer Security
Computer security
The collection of tools designed to protect data and to thwart hackers
Network security
Measures to protect data during their transmission
Internet security
Measures to protect data during their transmission over an internet
Vulnerability
Weak point in a system where a threat can sneak in
Threat
A potential damage that can be materialized through some flaw in the system
Risk
The probability of a threat being materialized by exploiting a vulnerability
Control
Any procedure that is in place to assure security of a system
• Authentication
o Assurance that the communicating entity is the is the one claimed
• Access control
o Prevention of the unauthorized use of a resource (preventing misuse of resources)
• Data confidentiality
o Protection of data from unauthorized disclosure (privacy)
• Data Integrity
o Assurance that data received is as sent by an authorized entity (has not been altered)
• Non-repudiation
o Protection against denial by one of the parties in a communication (the order is final)
Security Mechanisms (X.800)
Mechanisms Technical tools and techniques that are used to implement security services (how is the
implement security services)
o Encipherment
▪ Using Encryption and decryption algorithm (cryptography)
o Digital signatures
o Data integrity
▪ Check the message is modified or not (check value)
o Authentication exchange,
o Traffic padding
▪ Unwanted data include to message
o Routing control
▪ Change path time to time
o Notarization
• Pervasive security mechanisms
Mechanisms that are not specific to any particular OSI security service or protocol layer
o Trusted functionality
o Security label
o Event detection
o Security audit trail
o Security recovery