Chat with us, powered by LiveChat Cain and Able? Kohonen networks ?cyber security subject so that the matter should relate to cyber security for sure and should connect to readers | Wridemy

Cain and Able? Kohonen networks ?cyber security subject so that the matter should relate to cyber security for sure and should connect to readers

 Need to present a research reports on 

1.Cain and Able 

2. Kohonen networks

 Both reports should be written with a word count of 70-105 words(not more than the count provided) and should provide a URL reference link too . 

Note : NO PLAGIARISM 

Should have minimum of 3 statements which describes the information about the report.

Tips: Should be in simple own words and no usage of critical words and attached the file to know in detail to write on it. This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

Deadline Sep01, 2022 12:00Pm.Cst

Security in Computing, Fifth Edition

Chapter 5: Operating Systems

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

1

Chapter 4 Flashback

Phishing

2

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

2

Chapter 5 Objectives

Basic security functions provided by operating systems

System resources that require operating system protection

Operating system design principles

How operating systems control access to resources

The history of trusted computing

Characteristics of operating system rootkits

3

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

3

Operating System Functions

4

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Security-relevant features:

Enforced sharing

Inter-process communication and synchronization

Protection of critical data

Guaranteed fair service

Interface to hardware

User authentication

Memory protection

File and I/O device access control

Allocation and access control to general objects

4

Operating System Functions

5

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Security-relevant features:

Enforced sharing

Interprocess communication and synchronization

Protection of critical data

Guaranteed fair service

Interface to hardware

User authentication

Memory protection

File and I/O device access control

Allocation and access control to general objects

5

History of Operating Systems

Single-user systems, no OS

Multi-programmed OS, aka monitors

Multiple users

Multiple programs

Scheduling, sharing, concurrent use

Personal computers

Microsoft

Mac

Comparison

6

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

First, an entire computer was dedicated to one program at a time, but this approach proved wasteful

The first operating systems saved startup, loading, and shutdown time and made much better use of limited resources

The first personal computers took a major step back, as they were dedicated to single users and effectively one program at a time

Multitasking returned to the mainstream in the 1990s, and with it came all the lessons of the early shared computers

6

Protected Objects

Memory

I/O Devices:

Sharable I/O devices, such as disks

Serially reusable I/O devices, such as printers

Sharable programs and subprocedures

Networks

Sharable data

7

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

These are some of the common objects that need protection by and in OSs.

7

OS Layered Design

8

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Operating system visualized in layers, from most critical (bottom) to least critical.

8

Functions Spanning Layers

9

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Authentication is a good example of a function that needs to span the layers in the layered model.

9

Modular OS Design

10

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Modern OSs are built from discrete modules. These modules generally come from a variety of sources and are subject to updating/overwriting, so they cannot trust one another.

10

Virtualization

With virtualization, the OS presents each user with just the resources that user should see

The user has access to a virtual machine (VM), which contains those resources

The user cannot access resources that are available to the OS but exist outside the VM

A hypervisor, or VM monitor, is the software that implements a VM

Translates access requests between the VM and the OS

Can support multiple OSs in VMs simultaneously

Honeypot: A VM meant to lure an attacker into an environment that can be both controlled and monitored

11

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

The takeaway here is that, by acting as a sandbox, virtualization is a robust form of access control.

11

Separation and Sharing

Methods of separation:

Physical – printers for example

Temporal – processes executive at different times

Logical – illusion that no other processes exist

Cryptographic – processes conceal data and computations

Methods of supporting separation/sharing:

Do not protect – when sensitive procedures run at separate times

Isolate – processes running concurrently are unaware of the other

Share all or share nothing – owner choice public or private

Share but limit access or Limit use of an object

12

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Hardware Protection of Memory

13

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Fence

A fence defined by a fixed memory address. Users have access only to memory above a certain address.

13

Fence Registers

14

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Fence registers allow for the boundary to change

Like fences, but fence registers allow for the boundary to change.

14

Base/Bounds Registers

15

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Memory space can be broken into more than two sections, allowing for multiple users.

With base and bounds registers, memory space can be broken into more than two sections, allowing for multiple users.

15

Two Pairs of Base/Bounds Registers

16

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

This separates executable memory from data memory for each user, making it harder for bugs/attacks to overwrite code.

This separates executable memory from data memory for each user, making it harder for bugs/attacks to overwrite code.

16

Tagged Architecture

17

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

In a tagged architecture, each word of machine memory has one or more extra bits to identify its access rights. The big benefit is that access rights aren’t based on contiguous memory locations. Tagged architecture has not been widely adopted.

In a tagged architecture, each word of machine memory has one or more extra bits to identify its access rights. The big benefit is that access rights aren’t based on contiguous memory locations. Tagged architecture has not been widely adopted.

17

Segmentation

18

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

A program is divided into separate, logical pieces and each has its own set of access rights. The OS maintains a table of each segment and its true memory address, and it translates calls to each segment using that table (shown on next slide).

A program is divided into separate, logical pieces (e.g., an array, a procedure). Each segment has its own set of access rights. The operating system maintains a table of each segment and its true memory address, and it translates calls to each segment using that table (shown on next slide). Advantages:

The operating system can move segments around as necessary, which is very helpful as segments grow and shrink.

Segments can be removed from memory if they aren’t being used currently.

Every legitimate address reference must pass through the OS, providing an opportunity for access control.

18

Segment Address Translation

19

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Paging

20

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Similar to segmentation, programs are broken into fixed-size fragments (pages) rather than being broken down by logical unit. Because programs aren’t broken into logical units, paging doesn’t allow different parts of a program to have different access rights.

Similar to segmentation, but programs are broken into fixed-size fragments (pages) rather than being broken down by logical unit. Because programs aren’t broken into logical units, paging doesn’t allow different parts of a program to have different access rights.

20

Paged Segmentation

21

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Programs can be broken into segments, and the segments are then combined to fill pages. This approach creates an extra layer of translation but allows for the benefits of both paging and segmentation.

21

Paging vs. Segmentation

22

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Paging allows the main memory to use data that is residing on a secondary storage device. These data are stored in the secondary storage device as blocks of same size called pages. Paging allows the operating system to use data that will not fit in to the main memory.

Memory segmentation is a method that provides memory protection. Each memory segment is associated with a specific length and a set of permissions. When a process tries to access the memory it is first checked to see whether it has the required permission to access it.

22

Principles of Secure OS Design

Simplicity of design

OSs are inherently complex, and any unnecessary complexity only makes them harder to understand and secure

Layered design

Enables layered trust

Layered trust

Layering is both a way to keep a design logical and understandable and a way to limit risk

Example: very tight access controls on critical OS functions, fewer access controls on important noncritical functions, and few if any access controls on functions that aren’t important to the OS

23

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Kernelized Design

A kernel is the part of the OS that performs the lowest-level functions

Synchronization

Inter-process communication

Message passing

Interrupt handling

A security kernel is responsible for enforcing the security mechanisms of the entire OS

Typically contained within the kernel

24

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Kernelized Design

25

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

25

Reference Monitor

26

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

The reference monitor is the most important part of the security kernel, controlling access to objects.

The reference monitor is the most important part of the security kernel, controlling access to objects. A reference monitor must be tamperproof, unbypassable, and analyzable.

26

Trusted Systems

A trusted system is one that has been shown to warrant some degree of trust that it will perform certain activities faithfully

Characteristics of a trusted system:

A defined policy that details what security qualities it enforces

Appropriate measures and mechanisms by which it can enforce security adequately

Independent scrutiny or evaluation to ensure that the mechanisms have been selected and implemented properly

27

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

History of Trusted Systems

28

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Attempts to declare computers trustworthy go back almost 50 years. Over the years, changes in technology have resulted in new requirements, and the explosion of new devices and software have made it impossible to keep up.

28

Trusted Computing Base (TCB)

29

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

The TCB monitors and protects the secrecy and integrity of four basic interactions: process activation, execution domain switching, memory protection, and I/O operation.

The TCB portion of the OS is the part we depend on for enforcement of security policy. The TCB monitors and protects the secrecy and integrity of four basic interactions: process activation, execution domain switching, memory protection, and I/O operation.

29

Other Trusted System Characteristics

Secure startup

System startup is a tricky time for security, as most systems load basic I/O functionality before being able to load security functions

Trusted path

An unforgeable connection by which the user can be confident of communicating directly with the OS (BIOS setting)

Object reuse control

OS clears memory before reassigning it to ensure that leftover data doesn’t become compromised

Audit

Trusted systems track security-relevant changes, such as installation of new programs or OS modification

Audit logs must be protected against tampering and deletion

30

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Intel’s trusted boot technology uses TPMs to achieve secure startup.

30

Rootkits

A rootkit is a malicious software package that attains and takes advantage of root status or effectively becomes part of the OS

Rootkits often go to great length to avoid being discovered or, if discovered and partially removed, to reestablish themselves

This can include intercepting or modifying basic OS functions

31

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

Rootkit Evading Detection

32

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

In this example, a rootkit is hooking a system call in order to intercept potentially threatening results.

In this example, a rootkit is hooking a system call in order to intercept potentially threatening results.

32

Summary

OSs have evolved from supporting single users and single programs to many users and programs at once

Resources that require OS protection: memory, I/O devices, programs, and networks

OSs use layered and modular designs for simplification and to separate critical functions from noncritical ones

Resource access control can be enforced in a number of ways, including virtualization, segmentation, hardware memory protection, and reference monitors

Rootkits are malicious software packages that attain root status or effectively become part of the OS

33

From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved.

33

image2.emf

image3.emf

image4.emf

image5.emf

image6.emf

image7.emf

image8.emf

image9.emf

image10.emf

image11.emf

image12.emf

image13.emf

image14.emf

image15.jpg

image16.emf

image17.emf

image18.emf

image19.emf

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order

Related Tags

Academic APA Writing College Course Discussion Management English Finance General Graduate History Information Justify Literature MLA