M6 Main
M6 Main
SYSTEM
MODULE 6
PROTECTION AND SECURITY
Upon completion of this module, the student would be able to:
• Identify the role of the operating system with regard to system
security;
• Define the key properties to system survivability;
• Discuss the effects of system security practices on overall system
performance;
• Give the levels of system security that can be implemented and
the threats posed by evolving technologies;
• Enumerate the different types of security breaches;
• Identify system vulnerabilities and how to protect our system from
them;
Operating system plays a key role in computer system security.
• Any vulnerability at the operating system level opens the entire
system to attack
• The more complex and powerful the operating system, the
more likely it is to have vulnerabilities to attack
• Examples:
• Accidental incomplete modification of data
• When non-synchronized processes access data records
and modify some but not all of a record’s fields
• Errors due to incorrect storage of data values
Example: When the field isn’t large enough to hold the
numeric value stored there
(a) Original data value in a field large enough to hold it. If the field is too small,
(b) FORTRAN replaces the data with asterisks,
(c) COBOL truncates the higher order digits and stores only the digits that remain
• Types of Intentional attacks:
• Intentional unauthorized access
Examples: denial of service attacks, browsing, wire
tapping, repeated trials, trap doors, and trash collection
• Viruses and worms
• Trojan Horses
• Bombs
• Blended threats
• Denial of service (DoS) attack is one in which a malicious
hacker takes over computers via the Internet and causes them
to flood a target site with demands for data and other small
tasks causing a computer to perform repeated unproductive
task.
• Browsing is when unauthorized users gain access to search
through secondary storage directories or files for information
they should not have the privilege to read.
• Wire Tapping Unauthorized users monitor or modify a user’s
transmission
• Repeated Trials refer to entering systems by guessing
authentic passwords
• Kerberos is a network
authentication protocol.
• Designed to provide strong Using Kerberos, when client A
attempts to access server B, user is
authentication for client/server authenticated (a), and receives a
applications by using secret- ticket for the session (b). Once the
key cryptography. ticket is issued, client and server can
communicate at will (c). Without the
ticket, access is not granted.
Most extreme protection method for sensitive data where data
is put into a secret code
• To communicate with another system, data is encrypted,
transmitted, decrypted, and processed
• Sender inserts public key with the message
• Message receiver required to have private key to decode the
message
Disadvantages:
• Increases system’s overhead
• System becomes totally dependent on encryption process itself
Most basic techniques used to protect hardware and software
investments include:
• Good passwords
• Careful user training
Password Construction:
• Good password is unusual, memorable, and changed often
• Password files normally stored in encrypted form
• Password length has a direct effect on the ability of password
to survive password cracking attempts
Reliable techniques for generating a good password:
• Use minimum of eight characters, including numbers and non-
alphanumeric characters
• Create a misspelled word or join bits of phrases into a word
that’s easy to remember
• Follow a certain pattern on the keyboard
• Create acronyms from memorable sentences
• Use upper and lowercase characters if allowed
• Never use a word that’s included in any dictionary
• Dictionary attack is a method of breaking encrypted passwords
• Requirements:
• A copy of the encrypted password file
• Algorithm used to encrypt the passwords
• Prevention:
• Some operating systems “salt” user passwords with extra
random bits to make them less vulnerable to dictionary
attacks
• Use of a smart card
• A credit card-sized calculator that requires both “something
you have and something you know”
• User must type in the number that appears at that moment on
the smart card
• For added protection, user then enters a secret code
• User is admitted to the system only if both number and code
are validated
• Biometrics
• The science and technology of identifying individuals based
on unique biological characteristics of each person such as
human face, fingerprints, hand measurements, iris/retina, and
voice prints
• Positively identifies the person being scanned
• Critical factor is reducing the margin of error
• Siberschatz, A. (2018). Operating System Concepts,
Wiley.
• Tomsho, G. (2019). Guide to Operating Systems,
Cengage Learning.