Unit-4 OS
Unit-4 OS
INTRODUCTION TO OS SECURITY
Introduction to security
Any program that is run on a computer system has instructions executed by that computer’s CPU, but
these programs may also require the use of other peripheral resources of these complex systems.
To build any successful operating system, we identify three major tasks. First, the operating system
must provide various mechanisms that enable high performance use of computer resources .
resource mechanisms
Scheduling
Security
Operating systems must provide efficient resource mechanisms, such as file systems, memory manage-
ment systems, network protocol stacks, etc., that define how processes use the hardware resources.
Second, it is the operating system’s responsibility to switch among the processes fairly, such that the
user experiences good performance from each process in concert with access to the computer’s devices.
This second problem is one of scheduling access to computer resources
Introduction to os security
Third, access to resources should be controlled, such that one process cannot inadvertently or
maliciously impact the execution of another. This third problem is the problem of ensuring the security
of all processes run on the system.
Ensuring the secure execution of all processes depends on the correct implementation of resource and
scheduling mechanisms
SECURE OPERATING SYSTEMS
The ideal goal of operating system security is the development of a secure operating system.
A secure operating system provides security mechanisms that ensure that the system’s security goals are
enforced despite the threats faced by the system.
The security mechanisms must ensure these goals regardless of the possible ways that the system may
be misused (i.e., is threatened) by attackers.
SECURITY GOALS
A security goal defines the operations that can be executed by a system while still preventing unautho-
rized access.
Security goals describe how the system implements accesses to system resources that satisfy the
following:
Secrecy
Integrity
Availability
A system access is traditionally stated in terms of which subjects (e.g., processes and users) can perform
which operations (e.g., read and write) on which objects (e.g., files and sockets).
Secrecy requirements limit the objects that individual subjects can read because objects may contain
secrets that not all subjects are permitted to know.
Integrity requirements limit the objects that subjects can write because objects may contain
information that other subjects depend on for their correct operation.
SECURITY GOALS
An example of a goal defined in terms of security requirements is the simple-
security property of the Bell-LaPadula model .
The task of the secure operating system developer is to define security goals for
which the security of the system can be verified, so functional goals are
insufficient.
Emerging technology, such as virtual machine technology enables multiple,
commercial software systems to be run in an isolated manner on the same
hardware.
Thus, software that used to be run on the same system can be run in separate,
isolated virtual systems.
Security policy
What is security policy?
Security policies in a computer system refer to a set of rules, guidelines, and
permissions that govern access to system resources.
these policies define how users, processes, or entities interact with the system
and its components.
• Access Control
• Authentication and Authorization
• Confidentiality, Integrity, and Availability
Confidentiality: Protect sensitive information from unauthorized access.
Integrity: Ensure data remains accurate and unaltered.
Availability: Ensure resources are accessible when needed.
TRUST MODEL
A system’s trust model defines the set of software and data upon which the system depends for correct enforcement of system
security goals.
For an operating system, its trust model is synonymous with the system’s trusted computing base (TCB).
• a system TCB should consist of the minimal amount of software necessary to enforce the security goals correctly .
• The Trusted Computing Base (TCB) plays a critical role in ensuring the security of a computer system .
• What is the Trusted Computing Base (TCB)?
• The TCB refers to the set of components within a computer system that are essential for establishing and maintaining system-wide
information security policies. These components include hardware, firmware, and software. Here are the key points about the TCB:
1.Foundation for Security:
1. The TCB serves as the foundation for a system’s security.
2. It enforces security policies, ensuring that critical security mechanisms are in place.
2.Components Included:
1. Hardware components (such as processors, memory, and storage devices).
2. Firmware (e.g., BIOS, firmware controlling peripheral devices).
3. Software (including the operating system kernel and security-critical processes).
Trust model
1.Not Necessarily Secure:
1. Contrary to the usual connotations of the word “trust,” a “trusted” component
within the TCB is not necessarily secure or trustworthy.
2. In this context, “trusted” simply means critical to security within the system.
2.Extra Scrutiny:
1. Any component within the TCB should undergo extra scrutiny.
2. We must ensure that each trusted component merits the trust placed in it.
Access Control Fundamentals
An access enforcement mechanism authorizes requests (e.g., system calls) from multiple subjects (e.g.,
users, processes, etc.) to perform operations (e.g., read, write, etc.) on objects (e.g., files, sockets, etc.).
PROTECTION SYSTEM:
The security requirements of a operating system are defined in its protection system.
A protection system consists of a protection state, which describes the operations that system subjects can
perform on system objects, and a set of protection state operations, which enable modification of that
state.
LAMPSON’S ACCESS MATRIX
Lampson defined the idea that a protection state is represented by an access matrix, in general.
An access matrix consists of a set of subjects s ∈ S, a set of objects o ∈ O, a set of operations op ∈ OP ,
and a function ops(s, o) ⊆ OP , which determines the operations that subject s can perform on object o.
The function ops(s, o) is said to return a set of operations corresponding to cell (s, o).
Secret
Confi-
dential
Unclass
-ified
BELL-LAPADULA MODEL
• Bell-LaPadula
• This Model was invented by Scientists David Elliot Bell and Leonard .J. LaPadula.
• Thus this model is called the Bell-LaPadula Model. This is used to maintain
the Confidentiality of Security.
• Here, the classification of Subjects(Users) and Objects(Files) are organized in a non-
discretionary fashion, with respect to different layers of secrecy.