Trusted Operating Systems
Trusted Operating Systems
Purpose Operating
Systems
Protection features provided by general-purpose
operating systems—protecting memory, files, and
the execution environment
Controlled access to objects
User authentication
Protected Objects and
Methods of Protections
1rst OS were simple utilities –
executives
Multiprogramming OS required
monitors which oversaw each
program’s execution
Protected objects
Memory
Sharable I/O devices (disks)
Serially reusable devices (printers)
Shareable programs & subprocedures
Networks
Shareable Data
Security Methods of
Operating Systems
(different processes
Physical Separation
use different objects)
(processes executed
Temporal Separation
at different times)
Logical Separation (process appears to be
alone)
(processes
Cryptographic Separation
conceal data and computations)
Security Methods of
Operating Systems
(password,
Something the user knows
PIN, passphrase, mother’s
maiden name)
(ID, key, driver’s
Something the user has
license, uniform)
Something the user is (biometrics)
Use of Passwords
UK Study
(http://www.cnn.com/2002/TECH/ptech/03/13/d
angerous.passwords/?related)
50% passwords were family names
Celebrities/soccer stars – 9% each
Pets – 8%
10% reflect a fantasy
Only 10% use cryptic combinations
Attack on Passwords
Look on desk…
Try no password
Try user ID
Try user’s name
Common words (password, private, secret)
Short dictionary
Complete English word list
Common non-English dictionaries
Dictionary with capitalization and
substitutions (0 for o and 1 for i)
Brute force (lowercase alphabet)
Brute force (full character set)
Attack on Passwords
ENTER USER NAME: adams
ENTER PASSWORD: john
INVALID ACCESS
ENTER USER NAME: adams
ENTER PASSWORD: johnq
WELCOME TO THE XYZ COMPUTING
SYSTEMS
Attack on Passwords
UK Study
(http://www.cnn.com/2002/TECH/ptech/03/13/d
angerous.passwords/?related)
50% passwords were family names
Celebrities/soccer stars – 9% each
Pets – 8%
10% reflect a fantasy
Only 10% use cryptic combinations
Attack on Passwords
Look on desk…
Try no password
Try user ID
Try user’s name
Common words (123456,password, private,
secret)
Short dictionary
Complete English word list
Common non-English dictionaries
Dictionary with capitalization and
substitutions (0 for o and 1 for i)
Brute force (lowercase alphabet)
Brute force (full character set)
Password Selection
Criteria
Use characters other than A-Z
Choose long passwords
Avoid names and words
Choose unlikely password
Change password regularly (don’t reuse)
Don’t write it down
Don’t tell anyone
http://www.mit.edu/afs/sipb/project/doc/passwo
rds/passwords.html
One-time passwords
Authentication