OS and Security Principles
OS and Security Principles
CT069-3-3-DBS (VE1.0)
Topic 2
Operating System and Security Principles
Topic Learning Outcomes
• Vulnerability
– Weakness in the system that makes the data vulnerable to
• unauthorized access
• manipulation, or destruction by authorized/unauthorized
• Threat
– Security attack that can happen any time because of a security
vulnerabilities
• Risk
– Damage that can happen if the threat attack happens
CIA are three principles that form the core pillars of information
security which are essential for protecting data and systems.
Confidentiality:
Integrity:
Availability:
• OS Security
– The process of ensuring OS CIA – operating system (OS) stays
protected from intruders (hackers) and malicious computer
software (virus, worms, malware etc)
– This is to ensure confidentiality, integrity and availability (CIA) of
hardware resources, software and data that resides in the
computer that is running the OS
• Principles
– Rules to follow
– Practice guideline
• Economy of mechanism
– This basically means keep your system as simple as possible.
Simpler systems have fewer bugs and easier to debug and
protect.
– Only install or enable software or services that are required
initially
– If additional packages are needed later, they can be installed
when they are required
• Integrity
– Assurance that the software and data that we have is accurate
(up-to-date, not illegally modified etc)
– All data are added and updated by authorised persons or
systems accordingly to proper procedures
– Audit trail - We can trace all changes to data changes from the
time it was acquired to even after it was disposed (timeline
subject to laws etc).
– Continuous monitoring to ensure there is no security breach
Note: Not all users with access to a system will have the same access to all data
and resources on that system. Elevated privileges should be restricted to only
those users that require them only when they are needed to perform a task
• Confidentiality
– Permission control – authentication and authorization
– Encryption to protect the data on transit or at rest
– Data hiding (SQL Views)
• Fail-safe defaults
– Default to security, not insecurity. If policies can be set to
determine the behavior of a system, have the default for those
policies be stricter (more secure), not less.
• Acceptability
– If your highly secured system is difficult to use, then it will be
abandoned or avoided, and you will not achieve your goal
• Complete mediation
– It means that each action that is taken or allowed to take place
must all the security policies every single time the action is taken
• Availability
– Access control – control how many users can access at a
certain time, when system can be accessed etc
– Ensuring system/data is available to authorized users anytime
they need it without any interruptions
• Password Policies
– A good password policy is the first line of defense against the
unwanted accessing of an operating system.
– In most cases hackers utilize tools that use the dictionary
method to crack passwords. These tools use the permutations of
word in the dictionary to guess the password.
• Set of guidelines: –
– Enhances the robustness of a password
– Reduces the likelihood of password breaking
• Deals with:
– Complexity
– Change frequency
– Reuse
A Security Architecture
refers to an integrated set
of tools, procedures,
principles and roles/user
management which is
developed and deployed
to protect the system from
unauthorized access,
modification or
destruction.