0% found this document useful (0 votes)
7 views42 pages

OS and Security Principles

The document covers operating system (OS) security principles, including the CIA triad (Confidentiality, Integrity, Availability) and various threats and risks associated with database security. It outlines key concepts such as OS deployment planning, hardening measures, and security architecture, emphasizing the importance of maintaining security through continuous validation and auditing. Additionally, it discusses password policies and the roles of different stakeholders in ensuring system security.

Uploaded by

Lau Shireen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views42 pages

OS and Security Principles

The document covers operating system (OS) security principles, including the CIA triad (Confidentiality, Integrity, Availability) and various threats and risks associated with database security. It outlines key concepts such as OS deployment planning, hardening measures, and security architecture, emphasizing the importance of maintaining security through continuous validation and auditing. Additionally, it discusses password policies and the roles of different stakeholders in ensuring system security.

Uploaded by

Lau Shireen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Database Security

CT069-3-3-DBS (VE1.0)

Topic 2
Operating System and Security Principles
Topic Learning Outcomes

At the end of this topic, you should be able to:


1. Explain the OS security concepts
2. Explain the steps and process in OS deployment planning
3. Explain the scope of OS security maintenance

Module Code & Module Title Slide Title SLIDE 2


Recap From Last Lesson

• What are Vulnerability, Threat and Risk

Module Code & Module Title Slide Title SLIDE 3


Recap - Definitions

• Vulnerability
– Weakness in the system that makes the data vulnerable to
• unauthorized access
• manipulation, or destruction by authorized/unauthorized

• Threat
– Security attack that can happen any time because of a security
vulnerabilities

• Risk
– Damage that can happen if the threat attack happens

Module Code & Module Title Slide Title SLIDE 4


Recap - Vulnerability Access Points

Module Code & Module Title Slide Title SLIDE 5


‹#›
Recap - DB Security Threats & Risks

Threats Explanation Risks


Unauthorized Access by persons that should NOT have Data Theft - data is stolen
Access / Social access to the system and data
Engineering
Attack
Insider Threat / Intentional unlawful activity performed by Data Leakage –data is
Privilege Abuse employees with legimate access to the intentionally exposed to other
system, and data parties
Human Error Unintentional Mistakes or unlawful activity Data Corruption – data become
performed employees with legimate access unusable (partial or fully)
to the system and data
Hardware failure Failure of computing, network or storage Data Corruption or Data
devices Unavailable (temporary or
permanent)

Module Code & Module Title Slide Title SLIDE 6


Recap - DB Security Threats & Risks

Threats Explanation Risks


Denial of Service Intentional activities that jams up the Data Unavailable (temporary)
Attack system to a level that it stops functioning
SQL Injection Illegitimate access or manipulation of data Data Stolen or Data Corruption
Ransomware Computer malware that is used to hijack Data Unavailable (temporary or
Attack data ownership permanent)

Operating Software malfunction that results in Data Unavailable (permanent)


System or accidental data corruption or deletion
Application bug
Computer virus Computer malware that is used to corrupt Data Unavailable (permanent)
the data

Module Code & Module Title Slide Title SLIDE 7


This lecture - Contents & Structure

• CIA Triad – Confidentiality, Integrity and Availability


• OS security concepts and principles
• OS deployment planning and maintenance
• Application Security
• Windows Security
• Visualization security risk and issues.

Module Code & Module Title Slide Title SLIDE 8


CIA Triad

CIA are three principles that form the core pillars of information
security which are essential for protecting data and systems.

Module Code & Module Title Slide Title SLIDE 9


CIA Triad

• The CIA triad serves as a framework for designing and


implementing security measures to safeguard information assets.

• It helps organizations assess risks, identify vulnerabilities, and


implement appropriate controls to protect the confidentiality,
integrity, and availability of their data and systems.

• The CIA triad provides a simple yet comprehensive high-level


checklist for the evaluation of your security procedures and tools. An
effective system satisfies all three components: confidentiality,
integrity, and availability.

Module Code & Module Title Slide Title SLIDE 10


Confidentiality, Integrity and Availability

Confidentiality:

• This principle ensures that data is


accessible only to authorized individuals or
systems.

• It involves measures such as encryption,


user authentication and access controls to
prevent unauthorized access to sensitive
information.

Module Code & Module Title Slide Title SLIDE 11


Confidentiality, Integrity and Availability

Integrity:

• Integrity ensures that data remains accurate, complete,


and unaltered.

• It involves protecting data from unauthorized


modifications, whether intentional or accidental,
throughout its lifecycle.

• Techniques such as built-in integrity controls, access


controls, hashing/checksums and audit trails help
maintain data integrity.

Module Code & Module Title Slide Title SLIDE 12


Confidentiality, Integrity and Availability

Availability:

• Availability ensures that data and systems are accessible and


usable by authorized users when needed.

• It involves measures to prevent and mitigate disruptions, such


as hardware failures, cyberattacks, or natural disasters,
ensuring that services remain operational.

• Techniques used are backup/restores of data and securing and


controlling physical and remote access to the systems
(hardward, OS, DBMS, data) .

Module Code & Module Title Slide Title SLIDE 13


C.I.A – Summary
Confidentiality Integrity Availability
What?
• Data loss can cause • Data only has value if it is • Data only has value if
huge monetary and accurate. the right people can
image loss. • Information is safe from access it at the right
• Information is safe accidental modification time.
from accidental or or intentional • Information is
intentional unauthorized available to the
disclosure. modification authorized users
• Keeping the identity of • It is a requirement that when needed
authorized parties information and programs
involved in sharing and are changed only in a
holding data private specified and authorized
and anonymous. manner.
How ?
• Permission Control • Good database design & • Backup – up-to-date
(Authentication & implementation – backups in external
Authorization) constraints (entity, location to protect
• Encryption relationships, data type, against theft or
• Database, Column, data length, valid values, destruction
Backup default values etc) • Access control – limit
• Symm , Asymm, • Trigger (protection, users & timing to
Cert, Pwd auditing) ensure server is in
Module Code & Module Title • Hashing • Auditing (what happened or
Slide Title optimal condition SLIDE 14
Operating System Security Concepts
• Operating System is one of the most critical components in
information system security landscape
• Almost ALL software and program are running on top of an OS, that
include RDBMS
• Some software rely on proper behavior of underlying hardware such
as CPU, RAM and peripheral devices, in which the OS has ultimate
control
• Due to the complexity of modern-day OS, and securing an OS is not
an easy task.
• At a high conceptual level, the goals of securing an OS environment
will still bind to the C.I.A principles.

Module Code & Module Title Slide Title SLIDE 15


What is an OS ?
• An operating system (OS) is a system software that, after being
initially loaded into the memory, manages the computer hardware
and networking resources and provides common services to
computer programs and users.
• Operating System is one of the most critical components in
information system security landscape
• Almost ALL software and program are running on top of an OS, that
include RDBMS
• The application programs make use of the operating system by
making requests for services through a defined application program
interface (API).
• In addition, users can interact directly with the operating system
through a user interface, such as a command-line interface (CLI) or
a graphical UI (GUI).

Module Code & Module Title Slide Title SLIDE 16


Operating System Layer
• OS Security Layers

Layers in Operation System


User Applications and Utilities
Operation System Kernel
Physical Hardware
• Each layer needs to handle their respective security services
• Each layer is vulnerable to attack from below if the lower layers are not
secured appropriately

Module Code & Module Title Slide Title SLIDE 17


OS Hardening Measures

• OS hardening is one of the top security mitigation strategies


• Over 70% of targeted cyber intrusion can be prevented by the following
4 measures, according to Australia Australian Defense Signals
Directorate (DSD) 2010:
– white-list approved applications
– patch third-party applications and OS vulnerabilities
– restrict admin privileges to users who need them
– create a defense-in-depth*
* Strategy that leverage multiple security measures to secure an
information system environment

Module Code & Module Title Slide Title SLIDE 18


OS Security Principles

• OS Security
– The process of ensuring OS CIA – operating system (OS) stays
protected from intruders (hackers) and malicious computer
software (virus, worms, malware etc)
– This is to ensure confidentiality, integrity and availability (CIA) of
hardware resources, software and data that resides in the
computer that is running the OS

• Principles
– Rules to follow
– Practice guideline

Module Code & Module Title Slide Title SLIDE 19


OS Security Principles

• To address the vulnerabilities and better protect our data, we


need to adopt and apply IS and OS security principles
• In other words, a good security architecture will implement a
good set of security principles
• Security principles provides guideline on how we develop,
implement and operate IS components to be highly secure

Module Code & Module Title Slide Title SLIDE 20


Security Principles

• Economy of mechanism
– This basically means keep your system as simple as possible.
Simpler systems have fewer bugs and easier to debug and
protect.
– Only install or enable software or services that are required
initially
– If additional packages are needed later, they can be installed
when they are required

Module Code & Module Title Slide Title SLIDE 21


Security Principles

• Integrity
– Assurance that the software and data that we have is accurate
(up-to-date, not illegally modified etc)
– All data are added and updated by authorised persons or
systems accordingly to proper procedures
– Audit trail - We can trace all changes to data changes from the
time it was acquired to even after it was disposed (timeline
subject to laws etc).
– Continuous monitoring to ensure there is no security breach

Module Code & Module Title Slide Title SLIDE 22


Security Principles
• Least privilege
– Give a user the minimum privileges required to perform their
work. The more privileges you give to a party, the greater the
danger that they will abuse those privileges or mistakenly cause
more damage.

Note: Not all users with access to a system will have the same access to all data
and resources on that system. Elevated privileges should be restricted to only
those users that require them only when they are needed to perform a task

Module Code & Module Title Slide Title SLIDE 23


Security Principles

• Confidentiality
– Permission control – authentication and authorization
– Encryption to protect the data on transit or at rest
– Data hiding (SQL Views)

Module Code & Module Title Slide Title SLIDE 24


Data Exposure Levels:
Three Level Architecture to support principles
of
least privilege and confidentiality

Module Code & Module Title Slide Title SLIDE 25


Security Principles

• Fail-safe defaults
– Default to security, not insecurity. If policies can be set to
determine the behavior of a system, have the default for those
policies be stricter (more secure), not less.

• Separation of duty and privilege


– Require separate authentications to perform critical actions -
such user account to access emails; admin account to manage
database

Module Code & Module Title Slide Title SLIDE 26


Security Principles

• Acceptability
– If your highly secured system is difficult to use, then it will be
abandoned or avoided, and you will not achieve your goal

• Complete mediation
– It means that each action that is taken or allowed to take place
must all the security policies every single time the action is taken

Module Code & Module Title Slide Title SLIDE 27


Security Principles

• Availability
– Access control – control how many users can access at a
certain time, when system can be accessed etc
– Ensuring system/data is available to authorized users anytime
they need it without any interruptions

• Password Policies
– A good password policy is the first line of defense against the
unwanted accessing of an operating system.
– In most cases hackers utilize tools that use the dictionary
method to crack passwords. These tools use the permutations of
word in the dictionary to guess the password.

Module Code & Module Title Slide Title SLIDE 28


Security Principles

• Proper and Continuous Validation Done


– All setups, configurations and changes in the environments must
be properly tested/validated
– Testing should include functionality and security aspects to
ensure no new loopholes are created
– If failed, changes must be properly and fully reversed, and the
environment must be retested to ensure no loopholes are left
behind

Module Code & Module Title Slide Title SLIDE 29


What Is a Password Policy?

• Set of guidelines: –
– Enhances the robustness of a password
– Reduces the likelihood of password breaking

• Deals with:
– Complexity
– Change frequency
– Reuse

Module Code & Module Title Slide Title SLIDE 30


Importance of Password Policy

• First line of defense


• Most companies invest considerable resources to strengthen
authentication by adopting technological measures that protect their
assets
• Forces employees to abide by the guidelines set by the company
and raises employee awareness of password protection
• Helps ensure that a company does not fail audits and/or become an
easy target for hackers

Module Code & Module Title Slide Title SLIDE 31


Characteristics of Password Policy (Windows)

Module Code & Module Title Slide Title SLIDE 32


Characteristics of Password Policy (Windows) –
Account Lockout

Module Code & Module Title Slide Title SLIDE 33


Security Architecture

Module Code & Module Title Slide Title SLIDE 34


What is a Security Architecture
?

A Security Architecture
refers to an integrated set
of tools, procedures,
principles and roles/user
management which is
developed and deployed
to protect the system from
unauthorized access,
modification or
destruction.

Module Code & Module Title Slide Title SLIDE 35


Security Architecture

• People/Roles – players in the system


– Management
– DBA What is their roles and responsibilities?
What can they do ? What cannot they do
– Users ? Who manages the users ? etc
– Customers
• Procedures – how to do things in this system
– Must separate web and database servers
– Take backup every night
– Users must be authenticated using 2FA authentication
• Tools - what are the technologies that we can use to achieve high level security? What
devices or software that are allowed or prohibited from being used ? etc
– Use only the latest version of browser, os, application
– Old versions not allowed and must be un-installed
– Cannot use thumb drive

Module Code & Module Title Slide Title SLIDE 36


DB Security Architecture

Module Code & Module Title Slide Title SLIDE 37


Steps to build and ensure database
security

• Identification: Identify and investigate resources required and policies to be


adopted.
• Assessment: Analyze the system’s vulnerabilities, threats, and risks.
• Design: Design how security measures are implemented, which results in a
blueprint of the adopted security model that is used to enforce security.
• Implementation: Developed or purchase applications and tools to
implement the blueprint.
• Test and Evaluation: Evaluate the security implementation by testing the
system against typical software attacks, hardware failures, natural
disasters, and human errors.
• Auditing: Perform security audits periodically to ensure the security state of
the system is as expected.

Module Code & Module Title Slide Title SLIDE 38


Security Maintenance

• Process of maintaining security is continuous


• Security maintenance includes:
– Monitoring and analyzing logging information
– Performing regular backups
– Recovering from security compromises
– Regularly testing system security
– Using appropriate software maintenance processes to patch and update all critical
software, and to monitor and revise configuration as needed

Module Code & Module Title Slide Title SLIDE 39


Discussion

• What is the importance of security principles ?


• List 5 security principles

Module Code & Module Title Slide Title SLIDE 40


Summary / Recap of Main Points

• Importance of Operating System Security


• Security principles as guidelines
• Security principles : Economy of mechanism,
Integrity, Least privilege, Confidentiality, Fail-safe
defaults, Separation of duty and privilege,
Acceptability, Complete mediation, Availability,
Password Policies, Proper and Continuous Validation
Done

Module Code & Module Title Slide Title SLIDE 41


What To Expect Next Week

In Class Preparation for Class


• Data Obfuscation • Read about encryption,
hashing, SQL view

Module Code & Module Title Slide Title SLIDE 42

You might also like