Chapter Three
Chapter Three
COMPUTER SECURITY
SECURITY IN CONVENTIONAL
OPERATING SYSTEMS
Tag Word
R = Read only Access bits set by OS
R 0001 Tested every time
RW 0137 RW = Read/Write instruction accesses its
R 4091 X = Execute only location
R 0002
X
E. Segmentation
Benefits addressing + enhances memory protection for free
Effect of an unbounded number of base/bounds registers
Pgm segmentation:
Program divided into logical pieces (called segments)
E.g. Pieces are: code for single procedure / data of an array /
collection of local data values
Consecutive program segments can be easily stored in
nonconsecutive memory locations.
F. Paging
Principles:
Programs divided into equal-sized pieces called pages
Memory divided into same-sized page frames
Size is usually 2n, from 512 B to 4096 B
OS maintains Page Translation Table (PTT)
— maps pages into page frames
Benefits of paging
Programmer can be oblivious to page boundaries (automatic)
Paging completely hidden from programmer
No fragmentations of main memory
AUTHENTICATION
determine who can log on to a system, and the association of users with
the software subjects that they are able to control as a result of logging
in.
The four factors for authentication
1. Something you know, such as a password or a personal identification
number (PIN).
2. Something you have, such as a smart card or security token.
3. Something you are, such as fingerprint, voice, retina, or iris
characteristics.
4. Where you are, for example inside or outside a company firewall, or
proximity of login location to a personal GPS device.
AUTHORIZATION
Authorization is the process of Validating or figuring out the identity of a
person.
Once we know (reasonably) who it is, we need to decide what they can
access, and how.
Servers
Networks
Applications
Files (data)
Actions
Read (R)
Write (W)
Execute (X)
WHAT IS DATABASE SECURITY?
Database:
Security:
Database Security:
1. Secrecy
2. Integrity
3. Availability
SECRECY
It is protecting the database from unauthorized users.
Ensures that users are allowed to do the things they are trying to do.
For examples,
The employees should not see the salaries of their managers.
INTEGRITY
Protecting the database from authorized users.
For examples,
Payment orders regarding taxes should be made on time by the
tax law.
DATABASE PROTECTION REQUIREMENTS
1. Flow Control
2. Inference Control
3. Access Control
FLOW CONTROL
Flow controls regulate the distribution (flow) of information among
accessible objects.
Correlated Data:
If visible data X is semantically connected to invisible data Y.
INDIRECT ACCESS
Occurs when a user derives unauthorized data (say Y) from an
authorized source (say X).
SELECT Name OR SELECT Name
FROM GradeReport FROM GradeReport
WHERE grade = A WHERE ID=120000348
Name ID grade
GradeReport Abebe 120000348 A
Ayele 120000636 B
Mohammed 120000756 A
CORRELATED DATA
If visible data X is semantically connected to invisible data Y.