0% found this document useful (0 votes)
50 views31 pages

OS 9 IntroductionToSecurity

The document provides an introduction to computer security. It discusses the key objectives of security which are confidentiality, integrity, and availability. It then describes common threats like passive and active network attacks, backdoors, logic bombs, Trojan horses, viruses, and malicious mobile code. The document aims to outline common security concepts and threats to help readers understand computer security fundamentals.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views31 pages

OS 9 IntroductionToSecurity

The document provides an introduction to computer security. It discusses the key objectives of security which are confidentiality, integrity, and availability. It then describes common threats like passive and active network attacks, backdoors, logic bombs, Trojan horses, viruses, and malicious mobile code. The document aims to outline common security concepts and threats to help readers understand computer security fundamentals.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Operating Systems

ECEG-5202

INTRODUCTION TO SECURITY
Outline
▪Introduction
▪Threats and attacks
▪Defenses

January 16, 2023 INTRODUCTION TO SECURITY 2


Introduction
Computer security
The protection afforded to an automated information system in order to
attain the applicable objectives of preserving the integrity, availability, and
confidentiality of information system resources (includes hardware, software,
firmware, information/data, and telecommunications).
NIST Computer Security Handbook

Three key objectives


◦ Confidentiality
◦ Integrity
◦ Availability

January 16, 2023 INTRODUCTION TO SECURITY 3


Introduction…
Confidentiality
◦ Data confidentiality
◦ Assures that private or confidential information is not made available or disclosed to
unauthorized individuals
◦ Privacy
◦ Assures that individuals control or influence what information related to them may be collected
and stored and by whom and to whom that information may be disclosed

◦ A loss of confidentiality is the


unauthorized disclosure of
information

January 16, 2023 INTRODUCTION TO SECURITY 4


Introduction…
Integrity
◦ Data integrity
◦ Assures that information and programs are changed only in a specified and authorized manner
◦ System integrity
◦ Assures that a system performs its intended function in an unimpaired manner, free from deliberate or
inadvertent unauthorized manipulation of the system

◦ A loss of integrity is the unauthorized modification or destruction of information

January 16, 2023 INTRODUCTION TO SECURITY 5


Introduction…
Availability
◦ Assures that systems work promptly and service is not denied to authorized users
◦ A loss of availability is the disruption of access to or use of information or an
information system

CIA triad
◦ Security requirements
◦ Fundamental security objective

January 16, 2023 INTRODUCTION TO SECURITY 6


Introduction…
CIA attacks on assets

January 16, 2023 INTRODUCTION TO SECURITY 7


Introduction…
Additional concepts
◦ Authenticity
◦ The property of being genuine and being able to be verified and trusted; confidence in the
validity of a transmission, a message, or message originator
◦ Verifying that users are who they say they are and that each input arriving at the system came
from a trusted source

◦ Accountability
◦ Refers to the requirement for actions of an entity to be traced uniquely to that entity
◦ This supports no repudiation, deterrence, fault isolation, intrusion detection and prevention,
and after-action recovery and legal action
◦ Systems must keep records of their activities to permit later forensic analysis to trace security
breaches or to aid in transaction disputes

January 16, 2023 INTRODUCTION TO SECURITY 8


Introduction
Security is about
◦ Honest user (e.g., Alice, Bob, …)
◦ Dishonest attacker
◦ How the attacker
◦ Disrupts honest user’s use of the system (Integrity, Availability)
◦ Learns information intended for Alice only (Confidentiality)

January 16, 2023 INTRODUCTION TO SECURITY 9


Introduction…
Network security

January 16, 2023 INTRODUCTION TO SECURITY 10


Introduction…
Web security

January 16, 2023 INTRODUCTION TO SECURITY 11


Introduction…
Operating system security

January 16, 2023 INTRODUCTION TO SECURITY 12


Threats and attacks

January 16, 2023 INTRODUCTION TO SECURITY 13


Threats and attacks…..

January 16, 2023 INTRODUCTION TO SECURITY 14


Threats and attacks…
Communication lines and networks
◦ Passive attacks
◦ Attempts to learn or make use of information from the system but does not affect system
resources
◦ Goal
◦ Obtain information that is being transmitted

January 16, 2023 INTRODUCTION TO SECURITY 15


Threats and attacks…
Communication lines and networks ….
◦ Passive attacks…
◦ Telephone conversion, an electronic mail message, and a transferred file are subject to these
threats
◦ Release of message content
◦ Difficult to detect
◦ Do no involve any alteration of the data
◦ Solution
◦ Prevent the success of these attacks by means of encryption
◦ Encryption masks the contents of what is transferred, even if obtained by someone, they
would be unable to extract information
◦ Traffic analysis
◦ Focus is on prevention rather than detection

January 16, 2023 INTRODUCTION TO SECURITY 16


Threats and attacks…
Communication Lines and Networks…
◦ Active attacks
◦ Attempts to alter system resources or affect their operation
◦ Replay
◦ Involves the passive capture of a data unit and its subsequent retransmission to produce an
unauthorized effect
◦ Masquerade
◦ Takes place when one entity pretends to be a different entity
◦ Modification of messages
◦ Some portion of a legitimate message is altered, or that messages are delayed or reordered, to produce
an unauthorized effect
◦ Example
◦ A message stating, “Allow John Smith to read confidential file accounts ” is modified to say, “Allow
Fred Brown to read confidential file accounts”

January 16, 2023 INTRODUCTION TO SECURITY 17


Threats and attacks…
Communication Lines and Networks…
◦ Active attacks…
◦ Denial of service
◦ Prevents or inhibits the normal use or management of communications facilities
◦ Disable network or overload it with messages

◦ Difficult to prevent active attacks


◦ Require physical protection of all communications facilities and paths at all times
◦ Goal
◦ To detect them and recover from any disruption or delays caused by them

January 16, 2023 INTRODUCTION TO SECURITY 18


Threats and attacks…
Malicious software
◦ Backdoor (trapdoor)
◦ Is a secret entry point into a program that allows someone who is aware of the backdoor to gain
access
◦ Previously used to debug a program by programmers
◦ Used to gain special privileges
◦ Known as a maintenance hook
◦ Is code that recognizes some special sequence of input or is triggered by being run from a
certain user ID or by an unlikely sequence of events
◦ Becomes threat when used to gain unauthorized access
◦ Difficult to implement OS control for backdoor

January 16, 2023 INTRODUCTION TO SECURITY 19


Threats and attacks…
Malicious software…
◦ Logic bomb
◦ Is code embedded in some legitimate program that is set to “explode” when certain conditions
are met
◦ Examples of triggers
◦ Presence or absence of certain files
◦ A particular day of the week or date
◦ A particular user running the application
◦ Once triggered, a bomb may alter or delete data or entire files, cause a machine halt, or do
some other damage

January 16, 2023 INTRODUCTION TO SECURITY 20


Threats and attacks…
Malicious software…
◦ Trojan horse
◦ Claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase
your hard disk)
◦ Fits into one of the following three models
1. Continuing to perform the function of the original program and additionally performing
a separate malicious activity
2. Continuing to perform the function of the original program but modifying the function
to perform malicious activity or to disguise other malicious activity
◦ Example:
◦ A Trojan horse version of a login program that collects passwords
◦ A Trojan horse version of a process listing program that does not display certain processes that are
malicious
3. Performing a malicious function that completely replaces the function of the original
program

January 16, 2023 INTRODUCTION TO SECURITY 21


Threats and attacks…
Malicious software…
◦ Mobile code
◦ Refers to programs (e.g., script, macro, or other portable instruction) that can be shipped
unchanged to a heterogeneous collection of platforms and execute with identical semantics
◦ Transmitted from a remote system to a local system and then executed on the local system
without the user’s explicit instruction
◦ Often acts as a mechanism for a virus, worm, or Trojan horse to be transmitted to the user’s
workstation
◦ Mediums
◦ Java applets, ActiveX, JavaScripts, VBScripts

January 16, 2023 INTRODUCTION TO SECURITY 22


Threats and attacks…
Viruses
◦ Same as other programs but attaches itself to another
program and execute secretly when the host program is run
◦ Piece of code that automatically reproduces itself
Infection
◦ Infect other programs by modifying them
◦ Injecting the original program with a routine to make copies of the virus
program

◦ A computer virus has three parts (infection, trigger and Trigger


payload)

◦ Phases of a typical virus during its lifetime


◦ Dormant phase
◦ Propagation phase Payload
◦ Triggering phase
◦ Execution phase

January 16, 2023 INTRODUCTION TO SECURITY 23


Threats and attacks…
Worms Infection
◦ Piece of code that automatically reproduces itself over the network
◦ It doesn’t need the user intervention to propagate (autonomous)
◦ Scanning Trigger
◦ Examine host tables
◦ Target selection algorithm
◦ Email addresses, DNS, IP, network neighborhood
Target
Selection
◦ To replicate itself, a network worm uses some sort of network algorithm
vehicle
◦ Electronic email facility
◦ Emails itself to other systems
Scanning
◦ Remote execution capability
◦ Executes a copy of itself using an explicit remote execution facility or by exploiting a program flaw
engine
◦ Remote login capability

◦ Payload
◦ Malicious programs, virus, Trojan horse Payload
◦ Backdoor, DDoS agent, etc.
24
January 16, 2023 INTRODUCTION TO SECURITY
Threats and attacks…
Bots (Robots)
◦ Is a program that secretly takes over another Internet-attached computer and then
uses that computer to launch attacks that are difficult to trace to the bot’s creator
◦ Botnet
◦ Collection of bots often is capable of acting in a coordinated manner
◦ Characteristics
◦ Bot functionality
◦ Remote control facility
◦ Spreading mechanism to propagate the bots and construct botnet
◦ Could be used for (examples)
◦ Distributed denial-of-service (DDoS) attacks
◦ Is an attack on a computer system or network that causes a loss of service to users
◦ Spamming
◦ To send massive amounts of bulk e-mail (spam)
◦ Sniffing traffic
◦ To watch for interesting clear text data passing by a compromised machine
◦ Mostly used to retrieve sensitive information like usernames and passwords
January 16, 2023 INTRODUCTION TO SECURITY 25
Threats and attacks…
Rootkits
◦ Is a set of programs installed on a system to maintain administrator (or root)
access to that system
◦ Can make many changes to a system to hide its existence
◦ Alters the host’s standard functionality in a malicious and stealthy way
◦ With root access, an attacker can
◦ Have complete control of the system
◦ Add or change programs and files
◦ Monitor processes
◦ Send and receive network traffic

January 16, 2023 INTRODUCTION TO SECURITY 26


Threats and attacks…
Rootkit…
◦ Could be classified based on whether they can survive a reboot and execution mode
◦ Persistent
◦ Activates each time the system boots
◦ Must store code in a persistent store, such as the registry or file system, and configure a method by
which the code executes without user intervention
◦ Memory based
◦ Has no persistent code and therefore cannot survive a reboot
◦ User mode
◦ Intercepts calls to APIs (Application Program Interfaces) and modifies returned results
◦ Example, when an application performs a directory listing, the return results don’t include entries
identifying the files associated with the rootkit
◦ Kernel mode
◦ Can intercept calls to native APIs in kernel mode
◦ Example, The rootkit can hide the presence of a malware process by removing it from the kernel’s list of
active processes

January 16, 2023 INTRODUCTION TO SECURITY 27


Threats and attacks…
Rootkits…
◦ System-level call attacks (Kernel-level rootkits)
◦ Programs operating at the user level interact with the kernel through system calls
◦ System calls are a primary target of kernel-level rootkits to achieve concealment
◦ System call implementation (in Linux)
◦ Each system call is assigned a unique syscall number which is used by user-mode processes
◦ Kernel maintains a system call table with one entry per system call routine
◦ Each entry contains a pointer to the corresponding routine
◦ Syscall number serves as an index into the system call table

January 16, 2023 INTRODUCTION TO SECURITY 28


Threats and attacks…
Rootkits…
◦ System-level call attacks…
◦ Techniques that can be used to change
system calls
◦ Modify the system call table
◦ The attacker modifies selected syscall addresses stored in the system call table
◦ Modify system call table targets
◦ The attacker overwrites selected legitimate system call routines with malicious code
◦ The system call table is not changed
◦ Redirect the system call table
◦ The attacker redirects references to the entire system call table to a new table in a new kernel memory
location

January 16, 2023 INTRODUCTION TO SECURITY 29


Defenses
Many techniques exist for ensuring computer and network security
◦ Cryptography
◦ Secure networks
◦ Antivirus software
◦ Firewalls
◦ Access control
In addition, users have to practice “safe computing” by
◦ Not downloading from unsafe websites
◦ Not opening unknown attachments
◦ Not always trusting what you see on websites
◦ Avoiding scams
◦ …

January 16, 2023 INTRODUCTION TO SECURITY 30


Acknowledgment
These slides are adopted from the slides of
Surafel Lemma Abebe (Ph. D.)

Here, I would like to acknowledge and thank him for allowing me to


customize and use the slides for this course.

January 16, 2023 INTRODUCTION TO SECURITY 31

You might also like