Os Unit 4 - 1
Os Unit 4 - 1
I
1
File Management
Pr
2
File Management
Re
3
Computer security & protection
Protection and security requires that computer resources such as
CPU, softwares, memory etc. are protected.
This extends to the operating system as well as the data in the
system.
This can be done by ensuring integrity, confidentiality and
availability in the operating system.
The system must be protect against unauthorized access, viruses,
worms etc.
4
Computer security & protection
Threats to Protection and Security:
• A threat is a program that is malicious in nature and leads to harmful
effects for the system.
• Some of the common threats that occur in a system are −
Virus:
• Viruses are generally small snippets of code embedded in a system.
• They are very dangerous and can corrupt files, destroy data, crash
systems etc.
• They can also spread further by replicating themselves as required.
Trojan Horse:
• A trojan horse can secretly access the login details of a system.
• Then a malicious user can use these to enter the system as a
harmless being and wreak havoc.
5
Computer security & protection
Trap Door:
• A trap door is a security breach that may be present in a system
without the knowledge of the users.
• It can be exploited to harm the data or files in a system by malicious
people.
Worm:
• A worm can destroy a system by using its resources to extreme levels.
• It can generate multiple copies which claim all the resources and don't
allow any other processes to access them.
• A worm can shut down a whole network in this way.
Denial of Service:
• These type of attacks do not allow the legitimate users to access a
system.
• It overwhelms the system with requests so it is overwhelmed and
cannot work properly for other user.
6
Computer security & protection
Re
7
Attacks
Attacks:
Exposure: Sensitive data are directly released to an unauthorised entity.
•E.g.: a person giving his/her credit card numbers, to an outsider.
Interception: An unauthorized entity directly accesses sensitive data traveling
between authorized sources and destinations.
•E.g.: On a shared LAN, such as wireless LAN or a broadcast Ethernet, any device
attached to the LAN can receive a copy of packets intended for another device.
Inference: A threat action whereby an unauthorized entity indirectly accesses
sensitive data (but not necessarily the data contained in the communication) by
reasoning from characteristics or by-products of communications.
•E.g.: Traffic analysis, in which an adversary is able to gain info from observing
the pattern of traffic on the network.
Intrusion: An unauthorized entity gains access to sensitive data by overcoming a
system’s security protections.
8
Attacks
Masquerade: An unauthorized entity gains access to a system or
performs a malicious act by posing as an authorized entity.
•E.g.: This can happen if an unauthorized user has learned another
user’s logon ID and password.
•Another e.g. is malicious logic, such as a Trojan horse, that appears to
perform a useful or desirable function but actually gains unauthorized
access to the system resources or tricks a user into executing other
malicious logic.
Falsification: This refers to the altering or replacing of valid data or the
introduction of false data into a file or database.
•E.g.: A student may alter his/her grades on a school database.
Repudiation: In this case, a user either denies sending data or a user
denies receiving or possessing the data.
9
Attacks
Incapacitation: Prevents or interrupts system operation by disabling a
system component. This is an attack on system availability. This could
occur as a result of physical destruction of or damage to system h/w.
•E.g.: Viruses, Trojan horses, or worms.
Corruption: Undesirably alters system operation by adversely
modifying system functions or data. It is an attack on system integrity.
•E.g.: Malicious s/w could operate in such a way that system resources
or services function in an unintended manner.
Obstruction: A threat action that interrupts delivery of system services
by hindering system operation. One way to obstruct system operation
is to interfere with communications by disabling communication links
or altering communication control info.
10
Assets
• The assets of a computer system can be categorized as hardware,
software, data, and communication lines and networks.
11
Assets
12
Types Attackes
Passive attacks: are in the nature of eavesdropping on, or monitoring of, transmissions.
• The goal of the attacker is to obtain information that is being transmitted.
• Two types of passive attacks are release of message contents and traffic analysis.
• The release of message contents is easily understood.
• A telephone conversation, an electronic mail message, and a transferred file may
contain sensitive or confidential information.
• A second type of passive attack is traffic analysis.
Disadvantage of passive attacks:
• Passive attacks are very difficult to detect because they do not involve any alteration of
the data.
• Typically, the message traffic is sent and received in an apparently normal fashion and
neither the sender nor receiver is aware that a third party has read the messages or
observed the traffic pattern.
• However, it is feasible to prevent the success of these attacks, usually by means of
encryption.
• Thus, the emphasis in dealing with passive attacks is on prevention rather than
detection.
13
Types Attackes
Active attacks:
• Active attacks involve some modification of the data stream or the creation of a
false stream.
• They can be subdivided into four categories:
1. replay,
2. masquerade,
3. modification of messages, and
4. denial of service.
14
Types Attackes
Active attacks:
15