Topic 4 - Windows Security
Topic 4 - Windows Security
Windows Security
1
Computers are equipped with a layer of software called the operating
system, whose job is to provide user programs with a better, simpler,
cleaner, model of the computer and to handle managing all the
resources.
Operating System
Operating systems differ from user (i.e.,
application) programs in ways other than
where they reside. In particular, they are
What is OS? huge, complex, and long-lived.
The source code of the heart of an operating
system like Linux or Windows is on the order
of five million lines of code or more.
It should be clear now why operating systems
live a long time—they are very hard to write,
and having written one, the owner is loath to
throw it out and start again. Instead, such
systems evolve over long periods of time.
Windows 95/98/Me was basically one
operating system and Windows
What is OS? NT/2000/XP/Vista/Windows 7 is a different
one. They look similar to the users because
Microsoft made very sure that the user
interface of Windows
2000/XP/Vista/Windows 7 was quite similar
to that of the system it was replacing, mostly
Windows 98. Nevertheless, there were very
good reasons why Microsoft got rid of
Windows 98.
The architecture (instruction set, memory
organization, I/O, and bus structure) of
most computers at the machine-language
level is primitive and awkward to program,
especially for input/output. To make this
point more concrete, consider modern
SATA (Serial ATA) hard disks used on most
computers.
What is OS?
•User mode:
• Log-on process (winlogon): user logon
• Local Security Authority (LSA): password
verification and change, access tokens, audit
logs (MS04-11 buffer overflow: Sasser worm!)
• Security Accounts Manager (SAM): accounts
database, password encryption
• User Account Control (UAC, Vista): enforcement
of limited user privileges
7
Kernel mode and user mode
The user interface program, shell or GUI, is
the lowest level of user-mode software, and
allows the user to start other programs, such
as a Web browser, email reader, or music
player. These programs, too, make heavy use
of the operating system.
•A hierarchical database containing critical
system information
•Key-value pairs, subkeys, 11 values types
•A registry hive IS a group of keys, subkeys,
and values
•Security-related registry hives:
•HKEY_LOCAL_MACHINE \ SAM: SAM
database
•HKEY_LOCAL_MACHINE \ Security:
security logs, etc
•HKEY_LOCAL_MACHINE \ Software: paths 9
to programs!
Registry
Providing abstractions to application
programs is a top-down view. An alternative,
bottom-up, view holds that the operating
system is there to manage all the pieces of a
complex system.
OS as a Modern computers consist of processors,
Resource memories, timers, disks, mice, network
Manager interfaces, printers, and a wide variety of
other devices. In the bottom-up view, the job
of the operating system is to provide for an
orderly and controlled allocation of the
processors, memories, and I/O devices
among the various programs wanting them.
OS as a Resource
Manager
Resource management includes multiplexing
(sharing) resources in two different ways: in
time and in space. When a resource is time
multiplexed, different programs or users take
turns using it. First one of them gets to use
the resource, then another, and so on.
The other kind of multiplexing is space
multiplexing. Instead of the customers taking
turns, each one gets part of the resource.
https://www.youtube.com/watch?v=AkFi90lZ
Online Link mXA&ab_channel=TED-Ed
Introduction
Security is an important concern for operating systems.
An operating system (OS) is responsible for managing
hardware resources, software applications, and user
data.
It also provides mechanisms to ensure the security and
integrity of the system.
Security in an OS involves protecting the system
against unauthorized access, data loss, malware, and
other security threats.
An operating system plays a crucial role in
managing security. It provides various security
mechanisms to ensure the integrity and
confidentiality of the system. The role
of an
The operating system is responsible for managing
user accounts and permissions, file permissions,
operating
and network access control.
system in
The OS also provides authentication and
managing
encryption services to ensure secure
communication between different entities in the
system. Moreover, the operating system
security
maintains logs and audits to track system
activities and detect any suspicious activities.
Types of security
Security in an operating system can be
classified into three types:
◦ physical security
◦ network security
◦ data security.
Types of security: physical
security
19
Active
Active directory introduced in Windows 2000 is an LDAP-like
directory service for organization of system resources:
Users and groups
Directory Security credentials and certificates
System resources (desktops, servers, printers)
Security policies
DNS service
Trust management
20
Security in an operating system works by
implementing various security mechanisms
How security to protect the system against different
security threats. Some of the security
works in an mechanisms are:
operating ◦ Authentication
system ◦ Authorization
◦ Encryption
◦ Firewall
Authentication is the process of
verifying the identity of a user or
entity.
Authentication
The operating system uses
various authentication
mechanisms such as passwords,
biometric authentication, and
smart cards to authenticate
users.
Authorization is the process
of granting or denying
access to resources based
on user permissions.
Authorization
The operating system uses
access control lists (ACLs)
and permissions to control
access to resources.
Encryption is the process
of converting data into a
coded language to prevent
unauthorized access.
Encryption
operating
system Firewall rules can be based on IP
controls addresses, ports, protocols, and
applications.
firewall
Hacker vs Cracker
Online Link
https://support.microsoft.com/en-
us/windows/stay-protected-with-windows-
security-2ae0363d-0ada-c064-8b56-
6a39afb6a963
45