Lecture Protection and Security
Lecture Protection and Security
Objectives
Mechanism (Method)
Operating system provides access-matrix + rules
Ifensures that the matrix is only manipulated by
authorized agents and that rules are strictly enforced
Policy (Rules)
User dictates policy
Who can access what object and in what mode
Implementation of Access Matrix
There are 2 methods:
1. Access Control Lists
ACL can be created by dividing Access Matrix Column
Wise.
Separate list is maintained for each domain and each object.
It skips blank row entries in each domain.
2. Capability List
Can be created by dividing Access Matrix Row Wise.
It is list of access rights that a user / domain or a process has
for a object.
It is divided into 2 fields:
Object Descriptor
Access Rights
Access Matrix With Domains as Objects
Figure B
Operation on Access Matrix Entries
1. Copy
It allows the access right to
be copied only within the
column (for an object)
Ability to copy an access
right from one domain (row)
to another is denoted by
asterisk ( * )
A process executing in
domain D2 can copy read
operation into any entry
associated with file F2
The ability to copy rights is
denoted by an asterisk,
indicating that processes
in that domain have the
right to copy that access
within the same column
Access Matrix with Copy Rights
For example, in Figure
(a), a process executing in
domain D2 can copy the
read operation into any
entry associated with file
F2.
For example, suppose we include the control right in access(D2, D4). Then, a
process executing in domain D2 could modify domain D4, as shown.
Implementation of Access Matrix
1. GLOBAL TABLE:
Global Table consisting of a ordered set of triples <domain,
object, right set>
Before every operation on any object in any domain, the global table is
searched for triple.
If a triple is found, the operation is allowed to continue, otherwise,
an exception or error condition is raised.
Drawbacks:
Table is large. Can not be kept in the main memory. So additional I/O
is needed.
1. Trojan horse
A Trojan horse, or Trojan, is software that
appears to perform a desirable function for the
user, but steals information or harms the
system.
If a device gets infected, it sends the copies of itself onto the network
to other devices.
Include a Password
System allows authorized users who have valid user name and
password to access the system.
Threat Monitoring
Audit log – Check audit logs to see the time a user is trying to accesses
an object
Useful for recovery from a violation and developing better security
measures.
Scan the system periodically for security holes; done when the
computer is relatively unused.
Threat Monitoring (Cont.)
Check for:
Short or easy-to-guess passwords
Unauthorized set, user id’s
Unauthorized programs in system directories
Unexpected long-running processes
Improper directory protections
Improper protections on system data files
Changes to system programs
FireWall
Data Encryption:
Convert the data into a secret message on the basis of an encryption key
provided to authorized users.
Public-key Technique