SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Operating System
    Vulnerability and
             Control
(LINUX,UNIX and WINDOWS)
Definition of Vulnerability
A    Vulnerability is a weakness which allows
    an attacker to reduce system’s information
    assurance.

A    Vulnerability is the intersection of three
    elements: a system susceptibility or flaw,
    attacker access to the flaw, and attacker
    capability to exploit the flaw.



UNIX operating system
vulnerabilities
 Setuid   Problems


 Trojan   Horses


 Terminal   Troubles
Windows Vulnerabilities
   Passwords


   Peer-to-peer file sharing


   Vulnerabilities in embedded automation features in
    Microsoft Outlook and Outlook Express that can
    allow execution of rogue code.
LINUX Vulnerabilities
   Missing permission checks



   Uninitialized data



   Memory mismanagement
Why is Control important in
Operating Systems?
A key problem facing designers of traditional
 and embedded operating systems is the
 question of how to build adaptive software
 systems that are robust, predictable, and
 efficient across a range of operating
 conditions.
Architecture of Control
Systems
 Modern   control systems architectures can be
  considered analogous to today’s information
  networks.
 It is composed of several phases, including
  reconnaissance, traffic analysis, profiling of
  vulnerabilities, launching attacks, escalating
  privilege, maintaining access, and covering
  evidence.
Control provided by UNIX OS
MAC   : Mandatory Access
 Control
DAC : Discretionary Access
 Control
 If
   both DAC and MAC apply to an object,
  MAC wins.
What a trusted and secure OS
should contain?
 Memory   protection
 Enforce separation

 Simplicity

 Open design

 Complete mediation

 Ease of use
How does TCB help in security
of OS?
 TCB  stands for TRUSTRED COMPUTING
  BASE.
 In OS kernel is the lowest-level part, is
  responsible for various processes like inter-
  process communication, message passing,
  and so on.
 A Security Kernel is a part of kernel that
  deals with security.
 Trust   implies reliance and the TCB, is
  everything in the OS that we rely on to
  enforce security.
 If everything outside TCB is subverted, we
  still have a trusted system.
 If anything in TCB is subverted , then the
  security of the system is broken.
 Example   of trusted OS are SCOMP which
  was developed by Honeywell. It has less than
  10,000 loc in its security kernel, and strives
  for simplicity.
 Windows XP has 40,000,000 loc but still has
  numerous dubious features.
Next Generation Secure
Computing Base(NGSCB)
 Itis a product by Microsoft.
 NGSCB was formerly known as Palladium.

 NGSCB is designed to work with a special
  hardware called as Trusted Computing Group
  (TCG).
 Open systems like PCs offer a poor job of
  protecting secrets.
 NGSCB is called as “a virtual set-top box
  inside the PC”.
 The TCG is a tamper-resistant hardware,
  which is installed within the PC as a special
  hardware.
 The tamper-resistant will provide a secure
  place to store all secrets.
 NGSCB/TCG is a general security-
  enhancing technology, with DRM as one
  potential application.
Design goals of NGSCB
 To   provide high assurance.



 To   provide authentication operation.
NGSCB Feature Groups
 Strong process isolation
 Sealed storage

 Secure path

 Attestation
Thus it important to know the
various vulnerabilities in OS
and control them too.
THANK YOU…..

Weitere ähnliche Inhalte

Was ist angesagt?

Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYPriyanshu Ratnakar
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREADchuckbt
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
data hiding techniques.ppt
data hiding techniques.pptdata hiding techniques.ppt
data hiding techniques.pptMuzamil Amin
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 

Was ist angesagt? (20)

Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Information security
Information securityInformation security
Information security
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
STRIDE And DREAD
STRIDE And DREADSTRIDE And DREAD
STRIDE And DREAD
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Session Hijacking
Session HijackingSession Hijacking
Session Hijacking
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Information security
Information securityInformation security
Information security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
data hiding techniques.ppt
data hiding techniques.pptdata hiding techniques.ppt
data hiding techniques.ppt
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 

Ähnlich wie OS Vulnerabilities & Control Methods in Linux, Unix & Windows

Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of SystemsJamal Jamali
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesJavier González
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by KasperskyL. Duke Golden
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgL. Duke Golden
 
What Happened to Mathematically Provable Security?
What Happened to Mathematically Provable Security?What Happened to Mathematically Provable Security?
What Happened to Mathematically Provable Security?Frances Coronel
 
Wireless Sensor System Architecture
Wireless Sensor System ArchitectureWireless Sensor System Architecture
Wireless Sensor System Architecturevarun kumar
 
Factors Affecting the System Safety || Linux
Factors Affecting the System Safety || LinuxFactors Affecting the System Safety || Linux
Factors Affecting the System Safety || LinuxZain Abid
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented ProgrammingPatricia Viljoen
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemKaspersky Lab
 
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Toshiharu Harada, Ph.D
 
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth takingTop 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth takingPaula Januszkiewicz
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Alexander Decker
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Alexander Decker
 

Ähnlich wie OS Vulnerabilities & Control Methods in Linux, Unix & Windows (20)

Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of Systems
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Next Generation Embedded Systems Security for IOT:  Powered by KasperskyNext Generation Embedded Systems Security for IOT:  Powered by Kaspersky
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
 
Kl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktgKl iot cebit_dg_200317_finalmktg
Kl iot cebit_dg_200317_finalmktg
 
What Happened to Mathematically Provable Security?
What Happened to Mathematically Provable Security?What Happened to Mathematically Provable Security?
What Happened to Mathematically Provable Security?
 
Wireless Sensor System Architecture
Wireless Sensor System ArchitectureWireless Sensor System Architecture
Wireless Sensor System Architecture
 
Operating system
Operating systemOperating system
Operating system
 
Factors Affecting the System Safety || Linux
Factors Affecting the System Safety || LinuxFactors Affecting the System Safety || Linux
Factors Affecting the System Safety || Linux
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented Programming
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
 
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth takingTop 10 ways to make hackers excited: All about the shortcuts not worth taking
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
 
Ch11
Ch11Ch11
Ch11
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Walking around linux kernel
Walking around linux kernelWalking around linux kernel
Walking around linux kernel
 
Your First Guide to "secure Linux"
Your First Guide to "secure Linux"Your First Guide to "secure Linux"
Your First Guide to "secure Linux"
 
System structure
System structureSystem structure
System structure
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 

Mehr von أحلام انصارى

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticأحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognitionأحلام انصارى
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorأحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interactionأحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website أحلام انصارى
 

Mehr von أحلام انصارى (20)

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 
Cryptography
Cryptography Cryptography
Cryptography
 

OS Vulnerabilities & Control Methods in Linux, Unix & Windows

  • 1. Operating System Vulnerability and Control (LINUX,UNIX and WINDOWS)
  • 2. Definition of Vulnerability A Vulnerability is a weakness which allows an attacker to reduce system’s information assurance. A Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. 
  • 3. UNIX operating system vulnerabilities  Setuid Problems  Trojan Horses  Terminal Troubles
  • 4. Windows Vulnerabilities  Passwords  Peer-to-peer file sharing  Vulnerabilities in embedded automation features in Microsoft Outlook and Outlook Express that can allow execution of rogue code.
  • 5. LINUX Vulnerabilities  Missing permission checks  Uninitialized data  Memory mismanagement
  • 6. Why is Control important in Operating Systems? A key problem facing designers of traditional and embedded operating systems is the question of how to build adaptive software systems that are robust, predictable, and efficient across a range of operating conditions.
  • 7. Architecture of Control Systems  Modern control systems architectures can be considered analogous to today’s information networks.  It is composed of several phases, including reconnaissance, traffic analysis, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and covering evidence.
  • 8. Control provided by UNIX OS MAC : Mandatory Access Control DAC : Discretionary Access Control  If both DAC and MAC apply to an object, MAC wins.
  • 9. What a trusted and secure OS should contain?  Memory protection  Enforce separation  Simplicity  Open design  Complete mediation  Ease of use
  • 10.
  • 11. How does TCB help in security of OS?  TCB stands for TRUSTRED COMPUTING BASE.  In OS kernel is the lowest-level part, is responsible for various processes like inter- process communication, message passing, and so on.  A Security Kernel is a part of kernel that deals with security.
  • 12.  Trust implies reliance and the TCB, is everything in the OS that we rely on to enforce security.  If everything outside TCB is subverted, we still have a trusted system.  If anything in TCB is subverted , then the security of the system is broken.
  • 13.  Example of trusted OS are SCOMP which was developed by Honeywell. It has less than 10,000 loc in its security kernel, and strives for simplicity.  Windows XP has 40,000,000 loc but still has numerous dubious features.
  • 14. Next Generation Secure Computing Base(NGSCB)  Itis a product by Microsoft.  NGSCB was formerly known as Palladium.  NGSCB is designed to work with a special hardware called as Trusted Computing Group (TCG).  Open systems like PCs offer a poor job of protecting secrets.  NGSCB is called as “a virtual set-top box inside the PC”.
  • 15.  The TCG is a tamper-resistant hardware, which is installed within the PC as a special hardware.  The tamper-resistant will provide a secure place to store all secrets.  NGSCB/TCG is a general security- enhancing technology, with DRM as one potential application.
  • 16. Design goals of NGSCB  To provide high assurance.  To provide authentication operation.
  • 17. NGSCB Feature Groups  Strong process isolation  Sealed storage  Secure path  Attestation
  • 18. Thus it important to know the various vulnerabilities in OS and control them too.