Lecture Protection and Security
Lecture Protection and Security
Objectives
Mechanism (Method)
Operating system provides access-matrix + rules
Ifensures that the matrix is only manipulated by
authorized agents and that rules are strictly enforced
Policy (Rules)
User dictates policy
Who can access what object and in what mode
Implementation of Access Matrix
There are 2 methods:
1. Access Control Lists
ACL can be created by dividing Access Matrix Column
Wise.
Separate list is maintained for each domain and each object.
It skips blank row entries in each domain.
2. Capability List
Can be created by dividing Access Matrix Row Wise.
It is list of access rights that a user / domain or a process has
for a object.
It is divided into 2 fields:
Object Descriptor
Access Rights
Implementation of Access Matrix
Each column = Access-control list for one object
Defines who can perform what operation.
Each Row = Capability List (like a key)
For each domain, what operations allowed on what objects.
Object 1 – Read
Object 4 – Read, Write, Execute
Object 5 – Read, Write, Delete, Copy
Access Matrix With Domains as Objects
Figure B
Operation on Access Matrix Entries
1. Copy
It allows the access right to be copied only within the column
(for an object)
Ability to copy an access right from one domain (row) to another is
denoted by asterisk ( * )
A process executing in domain D2 can copy read operation into
any entry associated with file F2
The ability to copy rights is denoted by an asterisk, indicating
that processes in that domain have the right to copy that
access within the same column
Access Matrix with Copy Rights
For example, in Figure
(a), a process executing in
domain D2 can copy the
read operation into any
entry associated with file
F2.
1. Trojan horse
A Trojan horse, or Trojan, is software that
appears to perform a desirable function for the
user, but steals information or harms the
system.it looks like a genuine application
The biggest danger with a worm ,it could send out hundreds or
thousands of copies of itself,creating a huge devastating effect.
Include a Password
System allows authorized users who have valid user name and
password to access the system.
FireWall
Data Encryption:
Convert the data into a secret message on the basis of an encryption key
provided to authorized users.
Public-key Technique