صفحه 1:
Security Chapter 16

صفحه 2:
Computer System ‘Computer System sensitive es ‘ust be secure (le security) co” ata must be securely transmit Unrogh networks eaatwork security) رک امد ‎‘st be contrelled‏ مک هه ‎representing users‏ تسج ‎recess tote computer ‎facility must be controlled (user authentication) ‎Gsers making requests ‎Figure 16.1 Scope of System Security [MAEK87]

صفحه 3:
Types of Threats ° Interruption ~ An asset of the system is destroyed of becomes unavailable or unusable ~ Attack on availability ~ Destruction of hardware ~ Cutting of a communication line ~ Disal 6 ‏دحج‎ nagement syste 0 (b) Interruption 3

صفحه 4:
Types of Threats ° Interception ~ An unauthorized party gains access to an asset ~ Attack on confidentiality ~ Wiretapping to capture data ina network - ‏ححخححم ازم111‎ rr programs (e) Interception

صفحه 5:
Types of Threats ° Modification - An unauthorized party not only gains access but tampers with an asset ~ Attack on integrity - Changing values in a data file - Altering a program so that it performs differently ~ Modifying the content of messages being transmitted in ¢ (a) Modification

صفحه 6:
Types of Threats ° Fabrication ~ An unauthorized party inserts counterfeit objects into the system ~ Attack on authenticity ~ Insertion of spurious messages in a network ~ Additian of rararde to a file (©) Fabrication

صفحه 7:
Computer System Assets ° Hardware ~ Threats include accidental and deliberate damage ° Software ~ Threats include deletion, alteration, damage ~ Backups of the most recent versions can maintain high availability

صفحه 8:
Computer System Assets ° Data ~ Involves files ~ Security concerns fro availability, secrecy, and integrity ~ Statistical analysis can lead to determination of individual information which threatens privacy

صفحه 9:
Computer System Assets * Communication Lines and Networks - Passive Attacks ~ Learn or make use of information from the system but does not affect system resources ~ Traffic analysis * Encryption masks the contents of what is transferred so even if obtained by someone, they would be unable to extract information

صفحه 10:
Computer System Assets * Communication Lines and Networks - Passive Attacks ~ Release of message contents for a telephone conversion, an electronic mail message, and a transferred file are 10

صفحه 11:
Computer System Assets * Communication Lines and Networks - Passive Attacks ~ Traffic analysis » Encryption masks the contents of what is transferred so even if obtained by someone, thev would be unable to extract information 11 (by Traffe analysis

صفحه 12:
Computer System Assets * Communication Lines and Networks - Active Attacks ~ Masquerade takes place when one entity pretends to be a different entity Allee 12

صفحه 13:
Computer System Assets * Communication Lines and Networks - Active Attacks ~ Replay involves the passive capture of a data unit and its subsequent retransmission to produce an 13

صفحه 14:
Computer System Assets * Communication Lines and Networks - Active Attack ~ Modification of messages means that some portion of a legitimate message is altered, or that messages are delayed or reordered, to produ 14 {e) Moiteation of messages

صفحه 15:
Computer System Assets * Communication Lines and Networks - Active Attacks ~ Denial of service prevents or inhibits the normal use or management of communications facilities “4 messages ob (@ Denied of service

صفحه 16:
Protection ° No protection ~ Sensitive procedures are run at separate times ° Isolation ~ Each process operates separately from other processes with no sharing or communication 16

صفحه 17:
Protection ° Share all or share nothing ~ Owner of an object declares it public or private ° Share via access limitation ~ Operating system checks the permissibility of each access by a specific user to a specific object ~- Operating system acts as the guard

صفحه 18:
Protection ° Share via dynamic capabilities ~ Dynamic creation of sharing rights for objects ° Limit use of an object ~ Limit not just access to an object but also the use to which that object may be put ~ Example: a user may be able to derive statistical summaries but not to determine specific data values 18

صفحه 19:
Protection of Memory ° Security ° Correct functioning of the various processes that are active

صفحه 20:
User-Oriented Access Control ° Referred as authentication * Log on ~ Requires both a user identifier (ID) and a password ~ System only allows users to log on if the ID is known to the system and password. associated with the ID is correct - Users can reveal their password to others either intentionally or accidentally ~ Hackers are skillful at guessing passwords ~ ID/password file can be obtained 20

صفحه 21:
Data-Oriented Access Control ° Associated with each user, there can bea profile that specifies permissible operations and file accesses ° Operating system enforces these rules ° Database management system controls access to specific records or portions of records

صفحه 22:
Access Matrix ° Subject ~ An entity capable of accessing objects ° Object ~ Anything to which access is controlled ° Access rights ~ The way in which an object is accessed by a subject

صفحه 23:
Access Matrix File2 File3_— Filed Account 1 Account 2 ‘Own 3 8 R w R | Inquiry | Inquiry 8 Debit | Credit ‘Own 8 0 R Inquiry a Debit (a) Access matrix User A User B User ©

صفحه 24:
Access Control List ° Matrix decomposed by columns ° For each object, an access control list gives users and their permitted access rights

صفحه 25:
Access Control List File] OE 9 ۳9 Ww ‏مداد‎ LE 0 0 0 w ۳ ۲ 4 8 | 0۳ 3 w (b) Access control lists for files of part (a)

صفحه 26:
Capability Tickets ° Decomposition of access matrix by rows ° Specifies authorized objects and operations for a user

صفحه 27:
Capability Tickets ‎fea]‏ سح يمن سم | ‎1 ‎w ‎ ‏5ب ] ‎ ‎ ‎(c) Capability lists for files of part (a) ‎ ‎ ‎ ‎

صفحه 28:
Intrusion Techniques » Objective of intruder is the gain access to the system or to increase the range of privileges accessible on a system ° Protected information that an intruder acquires is a password

صفحه 29:
Techniques for Learning Passwords ° Try default password used with standard accounts shipped with system ° Exhaustively try all short passwords ۰ Try words in dictionary or a list of likely passwords * Collect information about users and use these items as passwords 29

صفحه 30:
Techniques for Learning Passwords ° Try users’ phone numbers, social security numbers, and room numbers ° Try all legitimate license plate numbers for this state ° Use a Trojan horse to bypass restrictions on access ° Tap the line between a remote user and the host system

صفحه 31:
ID Provides Security * Determines whether the user is authorized to gain access to a system ۰ Determines the privileges accorded to the user ~ Superuser enables file access protected by the operating system. ~ Guest or anonymous accounts have more limited privileges than others ° ID is used for discretionary access control ~ Auser may grant permission to files to others by ID 31

صفحه 32:
UNIX Password Scheme Password File cerypt(3) User id salt output

صفحه 33:
UNIX Password Scheme Password File erypt(3) User id salt output encrypted password aor compare (b) Verifying a password

صفحه 34:
Password Selection Strategies ° Computer generated passwords ~ Users have difficulty remembering them ~ Need to write it down ~ Have history of poor acceptance

صفحه 35:
Password Selection Strategies ° Reactive password checking strategy ~ System periodically runs its own password cracker to find guessable passwords ~ System cancels passwords that are guessed and notifies user ~ Consumes resources to do this ~ Hacker can use this on their own machine with a copy of the password file

صفحه 36:
Password Selection Strategies ° Proactive password checker ~ The system checks at the time of selection if the password is allowable ~ With guidance from the system users can select memorable passwords that are difficult to guess

صفحه 37:
efile of peal ot aoe ur intruder behav ‏تام‎ overlap in observe for expected behavior swveragebehuvior average behavior Measurable behavior of intruder ‏و‎ user Parameter Figure 16.7 Profiles of Behavior of Intruders and Authorized Users 37

صفحه 38:
Intrusion Detection ° Assume the behavior of the intruder differs from the legitimate user * Statistical anomaly detection ~ Collect data related to the behavior of legitimate users over a period of time ~ Statistical tests are used to determine if the behavior is not legitimate behavior 38

صفحه 39:
Intrusion Detection ° Rule-based detection ~ Rules are developed to detect deviation from previous usage pattern ~ Expert system searches for suspicious behavior

صفحه 40:
Intrusion Detection ° Audit record ~ Native audit records ° All operating systems include accounting software that collects information on user activity ~ Detection-specific audit records * Collection facility can be implemented that generates audit records containing only that information required by the intrusion detection system 40

صفحه 41:
Malicious Programs * Those that need a host program ~ Fragments of programs that cannot exist independently of some application program, utility, or system program ° Independent ~ Self-contained programs that can be scheduled and run by the operating system

صفحه 42:
42

صفحه 43:
Trapdoor ° Entry point into a program that allows someone who is aware of trapdoor to gain access ° Used by programmers to debug and test programs ~ Avoids necessary setup and authentication ~ Method to activate program if something wrong with authentication procedure 43

صفحه 44:
Logic Bomb ° Code embedded in a legitimate program that is set to “explode” when certain conditions are met ~ Presence or absence of certain files ~ Particular day of the week ~ Particular user running application

صفحه 45:
Trojan Horse ° Useful program that contains hidden code that when invoked performs some unwanted or harmful function * Can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly ~ User may set file permission so everyone has access

صفحه 46:
Virus ° Program that can “infect” other programs by modifying them ~ Modification includes copy of virus program ~ The infected program can infect other programs

صفحه 47:
Worms ° Use network connections to spread form system to system ° Electronic mail facility - Aworm mails a copy of itself to other systems * Remote execution capability - A worm executes a copy of itself on another system * Remote log-in capability ~ A worm logs on to a remote system as a user and then uses commands to copy itself from one system to the other 47

صفحه 48:
Zombie ° Program that secretly takes over another Internet-attached computer ° It uses that computer to launch attacks that are difficult to trace to the zombie’s creator

صفحه 49:
Virus Stages ° Dormant phase ~ Virus is idle ° Propagation phase ~ Virus places an identical copy of itself into other programs or into certain system areas on the disk

صفحه 50:
Virus Stages ° Triggering phase ~ Virus is activated to perform the function for which it was intended ~ Caused by a variety of system events ° Execution phase ~ Function is performed

صفحه 51:
Types of Viruses ° Parasitic ~ Attaches itself to executable files and replicates ~ When the infected program is executed, it looks for other executables to infect ° Memory-resident ~ Lodges in main memory as part of a resident system program - Once in memory, it infects every program that executes 51

صفحه 52:
Types of Viruses ° Boot sector ~ Infects boot record ~ Spreads when system is booted from the disk containing the virus ° Stealth ~ Designed to hide itself form detection by antivirus software

صفحه 53:
Types of Viruses ° Polymorphic ~ Mutates with every infection, making detection by the “signature” of the virus impossible ~ Mutation engine creates a random encryption key to encrypt the remainder of the virus ٠ The key is stored with the virus 53

صفحه 54:
Macro Viruses ° Platform independent ~ Most infect Microsoft Word documents ° Infect documents, not executable portions of code ° Easily spread

صفحه 55:
Macro Viruses * Amacro is an executable program embedded in a word processing document or other type of file e Autoexecuting macros in Word ~ Autoexecute » Executes when Word is started ~ Automacro » Executes when defined event occurs such as opening or closing a document ~ Command macro ° Executed when user invokes a command (e.g., File Save) ۳

صفحه 56:
Antivirus Approaches ° Detection ° Identification ° Removal

صفحه 57:
Generic Decryption * CPU emulator ~ Instructions in an executable file are interpreted by the emulator rather than the processor ° Virus signature scanner ~ Scan target code looking for known virus signatures * Emulation control module ~ Controls the execution of the target code 57

صفحه 58:
Digital Immune System ° Developed by IBM ° Motivation has been the rising threat of Internet-based virus propagation ~ Integrated mail systems ~ Mobile-program system

صفحه 59:
Vine ‏اسل _ا م‎ Virus tient ‏اما‎ ire Analysis Machine ‏عن‎ ‏مسد‎ ‎‘eat ‎een sate 7 sat ‏ا‎ Machine ۳7۳ User Figure 169 Digital Immune System = 1 1 Pes

صفحه 60:
E-mail Virus ° Activated when recipient opens the e-mail attachment ° Activated by opening an e-mail that contains the virus ° Uses Visual Basic scripting language ۰ Propagates itself to all of the e- mail addresses known to the infected host

صفحه 61:
Trusted Systems ° Multilevel security ~ Information organized into levels ~ No read up * Only read objects of a less or equal security level ~ No write down * Only write objects of greater or equal security level 61

صفحه 62:
62 Figure 16.10 Reference Monitor Concept Subjects

صفحه 63:
Trojan Horse Defense جعت و Data file

صفحه 64:
Trojan Horse Defense "CPEITOKS" Data file

صفحه 65:
Trojan Horse Defense "CPELT0KS" Data file

صفحه 66:
Trojan Horse Defense CPEITOKS" Data file

صفحه 67:
Windows 2000 Security ° Access Control Scheme ~ Name/password ~ Access token associated with each process object indicating privileges associated with a user

صفحه 68:
Access Token ° Security ID ~ Identifies a user uniquely across all the machines on the network (logon name) ° Group SIDs ~ List of the groups to which this user belongs * Privileges ~ List of security-sensitive system services that this user may call 68

صفحه 69:
Access token ° Default owner - 11 this process creates another object, this field specifies who is the owner ° Default ACL ~ Initial list of protections applied to the objects that the user creates

صفحه 70:
Security Descriptor Flags ~ Defines type and contents of a security descriptor Owner ~ Owner of the object can generally perform any action on the security descriptor System Access Control List (SACL) ~ Specifies what kinds of operations on the object should generate audit messages Discretionary Access Control List (DACL) ~ Determines which users and groups can access this object for which operations 70

صفحه 71:
71 1 111 1111111111111111 سس تحص ۳ Speciic aces pes ‏ع ید‎ Access System Security ‘Maximum allowed wre 16.13 Access Mask اله معت سأ ‎Generis Execute‏ | ‎Generis Waite‏ ‎Generis Read‏

جهت مطالعه ادامه متن، فایل را دریافت نمایید.
32,000 تومان