SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Policy and Mechanism


                                                               Protection mechanisms are used to authenticate
                                                               access to resources
                                                                   File protection
                                                                   Memory protection
      Chapter 14: Protection and Security                      A security policy reflects an organization’s strategy
                                                               to authorize access to the computer’s resources
                                                                   Managers have access to personnel files
                                                                   OS processes have access to the page table
                                                               Authentication mechanisms are the basis of most
                                                               protection mechanisms. Two types:
                                                                   External Authentication
                                                                   Internal Authentication




            External Authentication                           Internal
                                                           Authentication
 User/process authentication
    Is this user/process who it claims to be?
         Passwords
         More sophisticated mechanisms
 Authentication in networks
    Is this computer who it claims to be?                    Sharing parameters: A process changing the parameter values
                                                             of another process without access authorization is a violation.
         File downloading
                                                             Confinement: Contain all rights to resources so that they do not
         Obtaining network services                          propagate outside some chosen set of processes.
         The Java promise                                    Allocating rights: A process may provide another process with
                                                             specific rights to use its resources.
                                                             Trojan horse: If the server program takes advantage of the client
                                                             process’s rights to access resources on its own behalf, it is called
                                                             a Trojan horse.




       A Model for Resource Protection                                           A Protection System

Active parts (e.g., processes or threads) are called
subjects and act on behalf of users.                                Subjects                                Objects
Passive parts (i.e., resources) are called objects.
The particular set of rights a process has at any
given time is referred to as its protection domain.
A subject is a process executing in a specific
protection domain.
A protection system is composed of a set of
objects, a set of subjects, and a set of rules                S desires α access to X
specifying the protection policy.
Want mechanism to implement different security
policies for subjects to access objects
    Many different policies must be possible
    Policy may change over time




                                                       1
A Protection System                                            A Protection System


    Subjects                           Objects                     Subjects                           Objects




S desires α access to X
Protection state reflects current ability to access X          S desires α access to X
                                                               Protection state reflects current ability to access X
                                                               Authorities can change




               A Protection System                              A
                                                            Protection
                                                             System
                                                                              Subjects                     Objects

    Subjects                            Objects




                                                                S desires α access to X
S desires α access to X                                         Protection state reflects current ability to access X
Protection state reflects current ability to access X           Authorities can change
Authorities can change                                          What are rules for changing authority?
What are rules for changing authority?                          How are the rules chosen?




           Protection System Example                                      Protection System Example




                                                                                                       Access matrix
         S desires α access to X




                                                               S desires α access to X
                                                               Captures the protection state




                                                        2
Protection State Example                             Protection System Example




                                                                                Access matrix

                                                       S desires α access to X
                                                       Captures the protection state
                                                       Generates an unforgeable ID




          Protection System Example                                  A Protection System




                                                          Handling
                        Access matrix                       state
                                                          changes
S desires α access to X
Captures the protection state
Generates an unforgeable ID
Checks the access against the protection state




             Policy Rules Example                                    Protection Domains

                                                     Lampson model uses processes and domains —
                                                     how is a domain implemented?
                                                        Supervisor/user hardware mode bit
                                                                                                RN-1
                                                        Software extensions — rings
                                                                                                 RS+1
                                                                              The Ring
                                                                             Architecture              R0

                                                     Inner rings have higher authority
                                                         Ring 0 corresponds to supervisor mode
                                                        Rings 1 to S have decreasing protection, and
                                                        are used to implement the OS
                                                        Rings S+1 to N-1 have decreasing protection,
                                                        and are used to implement applications




                                                 3
Protection Domains                                 Implementing Access Matrix


 Ring crossing is a domain change                            Usually a sparse matrix
 Inner ring crossing rights amplification                       Too expensive to implement as a table
     Specific gates for crossing                                Implement as a list of table entries
     Protected by an authentication mechanism                Column oriented list is called an
                                                             access control list (ACL)
 Outer ring crossing uses less-protected objects
                                                                List kept at the object
    No authentication
                                                                UNIX file protection bits are one example
    Need a return path
                                                             Row oriented list is called a capability list
    Used in Multics and Intel 80386 (& above) hardware
                                                                List kept with the subject (i.e., process)
                                                                Kerberos ticket is a capability
                                                                Mach mailboxes protected with capabilities




                More on Capabilities                                        Cryptography

     Provides an address to object from a very large
                                                             Information can be encoded using a key when
     address space                                           it is written (or transferred) — encryption
     Possession of a capability represents
                                                             It is then decoded using a key when it is read
     authorization for access
                                                             (or received) — decryption
     Implied properties:
                                                             Very widely used for secure network
         Capabilities must be very difficult to guess        transmission
         Capabilities must be unique and not reused
         Capabilities must be distinguishable from
         randomly generated bit patterns




                More on Cryptography                                   More on Cryptography



                     Encryption
Plaintext                                   Ciphertext
                     Decryption




                                                         4
More on Cryptography                                         Cryptographic Systems




         Kerberos Network Authentication                              Kerberos Network Authentication

                                                             The client asks the authentication server for the
Kerberos is a set of network protocols that can be           credentials of the server process.
used to authenticate access to one computer by a user
at a different computer using an unsecure network.
In Kerberos, it is assumed that a process on one
computer (the client) wishes to employ the services of
a process on another computer (the server) using the
network for communication.
Kerberos assumes that information transmitted over
the network could be tampered with during
transmission.
Kerberos does not assume that the operating systems
on the two machines are necessarily secure.




         Kerberos Network Authentication                              Kerberos Network Authentication

The authentication server returns the credentials as a       After the client obtains the credentials, it decrypts the
ticket and a session key.                                    ticket and session key, keeping a copy of the session
                                                             key so that it can authenticate information from the
                                                             server.




                                                         5
Kerberos Network Authentication                          Kerberos Network Authentication
The client then sends a copy of the ticket with the       The server decrypts the copy of the ticket so that it
encrypted fields intact to the server.                    can obtain a secure copy of the client’s
                                                          identification and of the session key.




                        END




                                                      6

Weitere ähnliche Inhalte

Ähnlich wie Acl 6

Ch18 OS
Ch18 OSCh18 OS
Ch18 OSC.U
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating systemBhagyashree Barde
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systemsvampugani
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating Systemsohaildanish
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system securityG Prachi
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتAmr Rashed
 
2. access control
2. access control2. access control
2. access control7wounders
 
Access control by amin
Access control by aminAccess control by amin
Access control by aminaminpathan11
 
Protection Structures & Capabilities in Operating System
Protection Structures & Capabilities in Operating SystemProtection Structures & Capabilities in Operating System
Protection Structures & Capabilities in Operating SystemMeghaj Mallick
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) ghayour abbas
 
Ch01
Ch01Ch01
Ch01n C
 
Protection and security of operating system
Protection and security of operating systemProtection and security of operating system
Protection and security of operating systemAbdullah Khosa
 

Ähnlich wie Acl 6 (20)

Topic 7 access control
Topic 7 access controlTopic 7 access control
Topic 7 access control
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
Ch18 OS
Ch18 OSCh18 OS
Ch18 OS
 
OSCh18
OSCh18OSCh18
OSCh18
 
OS_Ch18
OS_Ch18OS_Ch18
OS_Ch18
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Thesis Proposal
Thesis ProposalThesis Proposal
Thesis Proposal
 
2. access control
2. access control2. access control
2. access control
 
Access control by amin
Access control by aminAccess control by amin
Access control by amin
 
Protection Structures & Capabilities in Operating System
Protection Structures & Capabilities in Operating SystemProtection Structures & Capabilities in Operating System
Protection Structures & Capabilities in Operating System
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Ch01
Ch01Ch01
Ch01
 
Protection and security of operating system
Protection and security of operating systemProtection and security of operating system
Protection and security of operating system
 

Kürzlich hochgeladen

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 

Kürzlich hochgeladen (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Acl 6

  • 1. Policy and Mechanism Protection mechanisms are used to authenticate access to resources File protection Memory protection Chapter 14: Protection and Security A security policy reflects an organization’s strategy to authorize access to the computer’s resources Managers have access to personnel files OS processes have access to the page table Authentication mechanisms are the basis of most protection mechanisms. Two types: External Authentication Internal Authentication External Authentication Internal Authentication User/process authentication Is this user/process who it claims to be? Passwords More sophisticated mechanisms Authentication in networks Is this computer who it claims to be? Sharing parameters: A process changing the parameter values of another process without access authorization is a violation. File downloading Confinement: Contain all rights to resources so that they do not Obtaining network services propagate outside some chosen set of processes. The Java promise Allocating rights: A process may provide another process with specific rights to use its resources. Trojan horse: If the server program takes advantage of the client process’s rights to access resources on its own behalf, it is called a Trojan horse. A Model for Resource Protection A Protection System Active parts (e.g., processes or threads) are called subjects and act on behalf of users. Subjects Objects Passive parts (i.e., resources) are called objects. The particular set of rights a process has at any given time is referred to as its protection domain. A subject is a process executing in a specific protection domain. A protection system is composed of a set of objects, a set of subjects, and a set of rules S desires α access to X specifying the protection policy. Want mechanism to implement different security policies for subjects to access objects Many different policies must be possible Policy may change over time 1
  • 2. A Protection System A Protection System Subjects Objects Subjects Objects S desires α access to X Protection state reflects current ability to access X S desires α access to X Protection state reflects current ability to access X Authorities can change A Protection System A Protection System Subjects Objects Subjects Objects S desires α access to X S desires α access to X Protection state reflects current ability to access X Protection state reflects current ability to access X Authorities can change Authorities can change What are rules for changing authority? What are rules for changing authority? How are the rules chosen? Protection System Example Protection System Example Access matrix S desires α access to X S desires α access to X Captures the protection state 2
  • 3. Protection State Example Protection System Example Access matrix S desires α access to X Captures the protection state Generates an unforgeable ID Protection System Example A Protection System Handling Access matrix state changes S desires α access to X Captures the protection state Generates an unforgeable ID Checks the access against the protection state Policy Rules Example Protection Domains Lampson model uses processes and domains — how is a domain implemented? Supervisor/user hardware mode bit RN-1 Software extensions — rings RS+1 The Ring Architecture R0 Inner rings have higher authority Ring 0 corresponds to supervisor mode Rings 1 to S have decreasing protection, and are used to implement the OS Rings S+1 to N-1 have decreasing protection, and are used to implement applications 3
  • 4. Protection Domains Implementing Access Matrix Ring crossing is a domain change Usually a sparse matrix Inner ring crossing rights amplification Too expensive to implement as a table Specific gates for crossing Implement as a list of table entries Protected by an authentication mechanism Column oriented list is called an access control list (ACL) Outer ring crossing uses less-protected objects List kept at the object No authentication UNIX file protection bits are one example Need a return path Row oriented list is called a capability list Used in Multics and Intel 80386 (& above) hardware List kept with the subject (i.e., process) Kerberos ticket is a capability Mach mailboxes protected with capabilities More on Capabilities Cryptography Provides an address to object from a very large Information can be encoded using a key when address space it is written (or transferred) — encryption Possession of a capability represents It is then decoded using a key when it is read authorization for access (or received) — decryption Implied properties: Very widely used for secure network Capabilities must be very difficult to guess transmission Capabilities must be unique and not reused Capabilities must be distinguishable from randomly generated bit patterns More on Cryptography More on Cryptography Encryption Plaintext Ciphertext Decryption 4
  • 5. More on Cryptography Cryptographic Systems Kerberos Network Authentication Kerberos Network Authentication The client asks the authentication server for the Kerberos is a set of network protocols that can be credentials of the server process. used to authenticate access to one computer by a user at a different computer using an unsecure network. In Kerberos, it is assumed that a process on one computer (the client) wishes to employ the services of a process on another computer (the server) using the network for communication. Kerberos assumes that information transmitted over the network could be tampered with during transmission. Kerberos does not assume that the operating systems on the two machines are necessarily secure. Kerberos Network Authentication Kerberos Network Authentication The authentication server returns the credentials as a After the client obtains the credentials, it decrypts the ticket and a session key. ticket and session key, keeping a copy of the session key so that it can authenticate information from the server. 5
  • 6. Kerberos Network Authentication Kerberos Network Authentication The client then sends a copy of the ticket with the The server decrypts the copy of the ticket so that it encrypted fields intact to the server. can obtain a secure copy of the client’s identification and of the session key. END 6