Chapter 6
Chapter 6
BURIE CAMPUS
DEPARTMENT OF COMPUTER SCIENCE
Operating System
By:
Amare W.
1
2
…. Cont’d
Network security on the other hand deals with provisions and
network-accessible resources.
4
…. Cont’d
Security refers to providing a protection system to computer
system resources such as:
– CPU, memory, disk
– software programs and
– most importantly data/information stored in the computer
system.
♥ So a computer system must be protected against
– unauthorized access by users and
– malicious access to system including viruses, worms etc…
5
Authentication of users
6
cont’d…
– encryption, isolation
7
Cont’d…
3/2/2018
9
Malware Attack…
♥ Malicious software can be divided into two categories:
♥ those that need a host program
– fragments of programs that cannot exist independently of some
actual application program, utility, or system program.
– Viruses and logic bombs are examples.
♥ those that are independent
♥ are self-contained programs that can be scheduled and run by
the operating system.
3/2/2018
Worms and zombie programs are examples.
10 01/27/2025
Malware Attack…
• Malicious software can also be divided into two categories:
trigger.
Malware Attack…
♥ Viruses:- A malicious code that replicates and hides itself
inside other programs usually without your knowledge.
♥ A virus is a piece of software that can "infect" other programs
by modifying them.
♥ Similar to biological virus: Replicates and Spreads
♥ Can do serious damage such as erasing file…
♥ Worms: A worm is a program that can replicate itself and send
copies from computer to computer across network connections.
3/2/2018
12 01/27/2025
♥ Service Pack- This is the biggie; the one you read about in the news when
14 01/27/2025
Cryptography
….cont’d
♥ Cryptography has five components:
- Plaintext: This is what you want to encrypt.
- Ciphertext: The encrypted output.
- Enciphering or encryption: The process by which plaintext is
converted into ciphertext.
- Encryption algorithm: The sequence of data processing steps
that go into transforming plaintext into ciphertext.
- Secret Key: is used to set some or all of the various parameters
used by the encryption algorithm.
- Deciphering or decryption: Recovering plaintext from
ciphertext.
- Decryption algorithm: The sequence of data processing steps
that go into transforming ciphertext back into plaintext.3/2/2018
17 01/27/2025
Keys
♥ A key can be thought of as simply a collection of bits
♥ The more bits, the stronger the key
♥ Keys are tied to specific encryption algorithms
♥ Lengths vary depending on the encryption algorithm
– e.g. 128 bits is long for some algorithms, but short for
others
3/2/2018
18 01/27/2025
Encryption Overview
♥ Plain text is converted to cipher text by use of an algorithm and key.
• Algorithm is publicly known
• Key is held private
♥ Three Main Categories
• Secret Key: single key is used to encrypt and decrypt information
• Public/Private Key
–two keys are used: one for encryption (public key) and one for
decryption (private key)
• One-way Function
– information is encrypted to produce a “digest” of the original 3/2/2018
information
that can be used later to prove its authenticity
19 01/27/2025
….cont’d
♥ Encryption is the process of taking some data and a key and
feeding it into a function and getting encrypted data out
♥ Encrypted data is, in principle, unreadable unless decrypted
♥ Decryption is the process of taking encrypted data and a key
and feeding it into a function and getting out the original data
– Encryption and decryption functions are linked
3/2/2018
20 01/27/2025
Encryption Techniques
Asymmetric Encryption
3/2/2018
23
….cont’d
3/2/2018
24 01/27/2025
Example: Use the additive cipher with key =15 to encrypt the message “hello”.
Soln. : We apply the encryption algorithm to the plaintext character by character
Plaintext : h 07 Encryption: (07+15)mod 26 Ciphertext: 22 W
Plaintext : e 04 Encryption: (04+15)mod 26 Ciphertext: 19 T
Plaintext : l 11 Encryption: (11+15)mod 26 Ciphertext: 00 A
Plaintext : l 11 Encryption: (11+15)mod 26 Ciphertext: 00 A
Plaintext : o 14 Encryption: (14+15)mod 26 Ciphertext: 03 D3/2/2018
So, the result is “WTAAD”
Note: By using the reverse decrypt algorithm, we can now decrypt the ciphertext
26 01/27/2025
II Polyalphabetic cipher
Autokey cipher, Playfair cipher and Vegenere cipher
♥ In the Autokey cipher, the key is a stream of sub keys, in which each sub key
is used to encrypt the corresponding character in the plaintext. The first sub
key is a predetermined value agreed upon by the sender and the receiver.
♥ The second sub key is the value of first plaintext character (between 0 and
25). The third subkey is the value of second plaintext character and so on.
♥ The name of the cipher autokey implies that the sub keys are automatically
generated from the plaintext cipher characters during the encryption process.
Encryption: Ci= (Pi+ki) mod 26
Decryption: Pi = (Ci – ki) mod 26
3/2/2018
27 01/27/2025
Transposition Techniques
♥ Systematically transpose the positions of plaintext elements (rearrange their
orders).
1. Keyless Transposition ciphers
♥ The simple transposition ciphers are keyless. There are two methods for
permutation of characters .
♥ In the first method, the text is written into a table column by column and then
transmitted row by row.
♥ In the second method, the text is written into the table row by row and then
transmitted column by column. Example: Rail fence cipher
♥ In this cipher the plaintext is arranged in two lines as a zigzag pattern ( which
means column by column); the ciphertext is created by reading3/2/2018
the pattern
row by row.
29 01/27/2025
OS Authentication Methods
♥ Authentication:-Verifies user identity; something a person is, has,
or does.
♥ Permits access to the operating system
♥ Use of biometrics, passwords, passphrase, token, or other private
information.
♥ Strong Authentication is important
♥ Physical authentication:- Allows physical entrance to company
property
♥ Magnetic cards and biometric measures 3/2/2018
OS Authentication Methods
♥ Biometrics:-Verifies an identity by analyzing a unique person
attribute or behaviour (e.g., what a person “is”).
♥ Most expensive way to prove identity, also has difficulties with
user acceptance. Most common biometric systems:
– Fingerprint
– Palm Scan
– Hand Geometry
– Iris Scan
– Voice Print
– Facial Scan
3/2/2018
33 01/27/2025
OS Authentication Methods
• Passwords: User name + password most
common identification, authentication
scheme.
– Weak security mechanism, must
implement strong password protections
• Passphrase: Is a sequence of characters
that is longer than a password.
– Takes the place of a password.
– Can be more secure than a password 3/2/2018
Recovery management
Thank you