Lecture Protection and Security
Lecture Protection and Security
Objectives
Mechanism (Method)
Operating system provides access-matrix +
rules
If ensures that the matrix is only manipulated by
authorized agents and that rules are strictly
enforced
Policy (Rules)
User dictates policy
Who can access what object and in what mode
Implementation of Access Matrix
There are 2 methods:
1. Access Control Lists
ACL can be created by dividing Access Matrix
Column Wise.
Separate list is maintained for each domain and
each object.
It skips blank row entries in each domain.
2. Capability List
Can be created by dividing Access Matrix Row Wise.
It is list of access rights that a user / domain or a
process has for a object.
It is divided into 2 fields:
Object Descriptor
Access Rights
Implementation of Access Matrix
Each column = Access-control list for one object
Each Row = Capability List (like a key)
For each domain, what operations allowed on
what objects.
Object 1 – Read
Object 4 – Read, Write, Execute
Object 5 – Read, Write, Delete, Copy
Access Matrix With Domains as Objects
Figure B
Operation on Access Matrix
Entries
1. Copy
It allows the access right
to be copied only within
the column (for an object)
Ability to copy an access
right from one domain
(row) to another is
denoted by asterisk ( * )
A process executing in
domain D2 can copy read
operation into any entry
associated with file F2
The ability to copy rights
is denoted by an asterisk,
indicating that processes
in that domain have the
right to copy that access
within the same column
Access Matrix with Copy Rights
For example, in
Figure
(a), a process
executing in domain
D2 can copy the read
operation into any
entry associated with
file F2.
Similarly, domain D2
owns F2 and F3 and thus
can add and remove
any valid right within
these two columns. Thus,
the access matrix of
Figure
(a) can be modified to the
access matrix shown in
Operation on Access Matrix
Entries
3. Control Right
Control right mechanism used to change entries in a row.
Control right is applicable only to domain objects.
If access( i , j ) includes control right, then a process executing in
domain Di can remove any access right from row j.
Switch operation works for column only
For example, suppose that, we include the control right in
access(D2, D4). Then, a process executing in domain D2 could
modify domain D4, as shown.
Operation on Access Matrix
Entries
3. Control Right
1. Trojan horse
A Trojan horse, or Trojan, is software
that appears to perform a desirable
function for the user, but steals
information or harms the system.
Include a Password
Audit log – Check audit logs to see the time a user is trying
to accesses an object
Useful for recovery from a violation and developing
better security measures.
Check for:
Short or easy-to-guess passwords
Unauthorized set, user id’s
Unauthorized programs in system directories
Unexpected long-running processes
Improper directory protections
Improper protections on system data files
Changes to system programs
FireWall
Data Encryption:
Convert the data into a secret message on the basis of an
encryption key provided to authorized users.
Public-key Technique