Security OS
Security OS
Denial of Service
Overload the targeted computer preventing it from doing
any useful work
Distributed denial-of-service (DDOS) come from
multiple sites at once
Consider the start of the IP-connection handshake
How many started-connections can the OS handle?
Consider traffic to a web site
How can you tell the difference between being a target and
being really popular?
Accidental – CS students writing bad fork() code
Purposeful – extortion, punishment
Cryptography as a Security Tool
Broadest security tool available
Internal to a given computer, source and destination of
messages can be known and protected
OS creates, manages, protects process IDs, communication
ports
Source and destination of messages on network cannot be
trusted without cryptography
Local network – IP address?
Consider unauthorized host added
WAN / Internet – how to establish authenticity
Not via IP address
Example: Windows 7
Security is based on user accounts
Each user has unique security ID
Login to ID creates security access token
Includes security ID for user, for user’s groups, and
special privileges
Every process gets copy of token
System checks token to determine if access allowed or
denied
Uses a subject model to ensure access security
A subject tracks and manages permissions for each
program that a user runs
Each object in Windows has a security attribute defined by a
security descriptor
For example, a file has a security descriptor that indicates
the access permissions for all users