Auditing Operating Systems Networks: Security Part 1: and
Auditing Operating Systems Networks: Security Part 1: and
Auditing Operating Systems Networks: Security Part 1: and
ANDAYA, Queenie
CABALTICA, Ednalyn
CARIÑO, Pamela
PACNA, Kriza
PASCUAL, Engel
WIGAN, Krizel Faye
Security Part 1:
Auditing Operating
Systems and Networks
Security Part 1: Auditing
Operating Systems and
Networks
• Auditing Operating
Systems
• Auditing Networks
• Auditing EDI
• Auditing PC-Based
Accounting System
Operating System Threats to System
Objectives Integrity
Operating System
Operating System
Controls and
Security
Audit Test
Operating Systems
–It is the computer’s control program.
–It allows users and their applications to share
and access common resources, such as
processors, main memory, databases, and
printers.
–The larger the computer facility, the greater
the scale of potential damage.
Operating System: Tasks
• Translates high level languages into the machine-level
language
• Allocates computer resources to users, workgroups, and
applications
• Manages the tasks of job scheduling and multiprogramming.
Jobs are submitted to the system in three ways:
1. Directly by the system operator
2. From various batch-job queues
3. Through telecommunication links from remote workstations
Operating System Objectives
1. The OS must protect itself from users.
2. The OS must protect users from each other.
3. The OS must protect users from themselves.
4. The OS must be protected from itself.
5. The OS must be protected from its environment.
Operating System Security
– It involves policies, procedures, and controls that
determine who can access the operating system, which
resources they can use, and what actions they can take.
– Its components include: log-on procedure, access token,
access control list, and discretionary access privileges.
Operating System Security:
Components
1. Log-on Procedure
– First line of defense against unauthorized access
Operating System Security:
Components
• Access Token
– Contains key information about the user that is used to
approve all actions the user attempts during the session
Operating System Security:
Components
• Access Control List
– It is assigned to each IT resource (computer directory,
data file, program, or printer), which controls access to
the resources.
– It contain information that defines the access privileges
for all valid users of the resource.
Operating System Security:
Components
• Discretionary Access Privileges
– These are granted to resource owners and these allows
them to grant access privileges to other users.
Threats to Operating System Integrity
• Accidental Threats
– These refer to situations in which damage or data loss
occurs as a results of an insider with no malicious intent.
Threats to Operating System Integrity
• Intentional Threats
– These refer to attempts to illegally access data or
violate user privacy for financial gain.
– These exposures come from three sources:
1. Privileged personnel who abuse their authority.
2. Individuals, both internal and external to the
organization, who browse the OS to identify and
exploit security flaws.
3. Individuals who intentionally insert computer viruses
or other forms of destructive programs into the OS.
Operating System Controls and Audit
Tests
• Controlling Privileges
– Management should ensure that individuals are not
granted privileges that are incompatible with their
assigned duties.