500 likes | 518 Views
Telecommunications and Network. Physical and Personnel. System. Application and Individual. Planning, Policies, and Procedures. Objectives. Describe major OS functions Recognize OS related threats Apply major steps in securing the OS
E N D
Telecommunications and Network Physical and Personnel System Application and Individual Planning, Policies, and Procedures Objectives • Describe major OS functions • Recognize OS related threats • Apply major steps in securing the OS • Perform a vulnerability scan to identify existing vulnerabilities on an active system
An Operating System Is… … a program that acts as an intermediary between a computer user and computer hardware. What does that mean?
Early Operating Systems • 1950s • Monitor system • Batch processing • Spooling • No interaction with program while running • 1960s • Multiprogrammed batch systems • Graphical displays, pointing devices • Timesharing (multitasking) – first interaction with running programs • MULTICS – multiuser forerunner of Unix
Operating System Evolution • 1970s • Personal computer systems – resident monitor • Windowing, icons, menus, and pointers are developed as an interface • 1980s • PCs become affordable • Multiprocessor systems • 1990s • Distributed computing • Mainstream graphical interface
Operating System Tasks • Management Tasks • Process management • Main-memory management • File management • I/O system management • Secondary storage management • Networking management • Protection system • User interface management • Command Line Interface (CLI) • Graphical User Interface (GUI)
Process Management • Many processes running on a modern computer system • Manage schedule, time to execute, and resources for each process • Create and delete processes • Suspend and resume of processes • Provide for process synchronization • Provide for communication • Provide deadlock avoidance
Main Memory Management • Memory is the storage area the CPU uses for executing programs • Each process (including the operating system) must have its own piece of memory • Keep track of which process is where • Decide which process to load when there is room • Allocate and deallocate memory as needed
File Management • The basic storage unit from a user perspective • Provide structure (directories, file types, etc.) to storage • Create and delete files and directories • Support manipulation of files and directories • Map files to secondary storage • Backup files
I/O System Management • Hides the specifics of I/O devices from the user • Provides tools to handle the speed difference between CPU and I/O devices • Memory management for buffering, caching, and spooling • General device driver interface • Hardware specific device drivers
Secondary Storage Management • Why? Because main memory is usually too small to hold all programs and disappears when power is turned off • Non-volatile (stays when power is turned off) and larger than main memory • Use disk drives (tapes, punch cards, etc.) • Manage free space • Allocate storage • Schedule disk activity
Network Management • Network communications for the system is a special case of I/O • Manages communication links by • Establishing connections • Scheduling communication • Directing communication to correct processes
Protection System Management • The operating system plays a basic role in protecting information, especially on multitasking and multiuser systems • Protect memory for processes • Provide file access mechanism • Provide authentication and access control mechanisms
User Interface Management • A way to give commands to the computer • Accomplished via command line and/or Graphical User Interface (GUI) • Accepts and acts on user commands in a timely manner
Operating Systems • Operating system developers determine which features are implemented and what capabilities they have • For example, early personal computer operating systems had no protection mechanism other than reserving special memory locations for the operating system
So Far • Operating systems manage computer resources • Schedules time • Allocates space (in memory, on disk) • Handles I/O • Protects system and information
Operating Systems Security • Goals of operating system security • Confidentiality: Only let authorized entities access computer and information • Corollary: Only run authorized processes • Integrity: Only allow authorized changes to information • Availability: Manage resources to permit access to information and system at all required times
Authorization & Authentication • Who is authorized? • Authorized by policy of organization and operational requirements • How do we know? • Accounts (identification) • Known systems • Password • Secure communication channel
Access Control • Controls how users and systems communicate and interact with other systems and resources • First line of defense • Authenticate before allowing access to authorized resources
Operating System Access Controls • Two basic methods • Access Control List (ACL) • For every resource, indicates who has access and what kind of access • Permissions based on identification • User permissions • Group permissions • Additional controls • Passwords for files, resources, etc.
Managing Identities • Local user and group accounts • Directory server • LDAP • Microsoft Domain Controller • Policies and operational requirements • Introduces need for “trust” relationships
Auditing – A Trail To Follow • Detect auditable events • What is an auditable event? • Collect and save in secure location • Where do you save them? • How do you protect logs? • Analyze results • Human readable? Searchable? Prioritized? • Fix problems
Access & Audit What? • Resources • Computer system • Processes • Files • Memory • Disk drives • Printers • Communication • Etc.
Threats To Operating Systems • Compromise system to gain unauthorized access to system resources • Weak/broken identification • Weak internal security structures • Programming errors in operating system
It’s You! • How do you let people know who you are? • How can we tell you are who you say you are? • Will this allow me to trace actions back to you? Identification Authentication Non-repudiation
Once Identified, Authorize • User accounts are the mechanism used to identify and authorize people • Access control is based on identification • Most common authentication: password • Password and account policies help improve security Joe
Implementing Policies • Recall: policies can be topic specific • Procedures can be one way to implement policies • Policies can also be implemented in hardware or software • Password and account policies are often implemented using operating system features
Password Policy • What makes a good password policy? • How many new passwords should you use before you can reuse an old password? • How long should a password be valid? • How long must you use a password before you change it? • What is the minimum length for a password? • Should there be complexity requirements? • Should the password be stored so it can be decrypted?
Account Policy • Should your account be locked if you don’t log in correctly? If so, how long should it be locked? • How many login failures should occur before your account is locked? • How much time should elapse before a failed login is no longer counted?
Vulnerabilities • Protection function – Access control • Compromise access control to attack other functions • Process management • Unauthorized processes • Hidden processes • Affect other processes • Main memory management • Access other processes’ memory
More Vulnerabilities • File management • Unauthorized access to files • Create unauthorized files • I/O system management • Unauthorized I/O • Affect authorized I/O • Secondary storage • Access or corrupt
Even More Vulnerabilities • Network • Unauthorized connections/communications • Disable or compromise • Affect authorized use • User interface • Eavesdrop • Deny access to authorized users • Permit access to unauthorized users
Threats • How do threats affect the system? • Affect availability • Compromise confidentiality or integrity • How do you tell if you have a problem? • Process listing – Network connections • Memory check – Storage size • Auditing logs • What if management tools are compromised?
Specific Operating System Attacks • DoS • Hack (or crack) the system • Backdoor • Memory issues • Escalation of privileges • Default settings
Confidentiality Integrity Availability Denial of Service (DoS) • An attack on availability • Consume resources • CPU or memory • Communication • Recall terms • ping, Smurf, botnet CIA
Confidentiality Integrity CIA Availability Hack The System • Exploit a vulnerability to gain unauthorized access to the system • Access as an existing user • Perform other actions • Add unauthorized account • Add malicious software • Use system resources
Confidentiality Integrity CIA Availability Backdoor • What is a backdoor? • An access method thatbypasses the normalsecurity of the system • How does it get there? • What impact mightit have?
Confidentiality Integrity Availability Memory Issues • Memory is not erased before given to another process • Gives new process access to information from old process • What is the impact? • Memory is not released by a process • What is the impact? CIA
Confidentiality Integrity CIA Availability Escalation Of Privileges • User exploits vulnerability to gain unauthorized access • Gain administrator access • Gain access as aspecific account • What is the impact?
Confidentiality Integrity CIA Availability Default Settings • Most operating systems ship in the simplest configuration… unsecure • Security features disabled • Default accounts enabled with standard passwords • Available services (programs) running
How Do They Do It? • The key is gaining access • Break an operating system management function to gain command access • Connect to print server, cause process to create a command line as administrator • Send special packets to network controller to cause a buffer overflow to execute program • And many more
Securing Systems • Perform system “hardening” • Find out what vulnerabilities are still present • Perform a vulnerability scan • Fix them
Countermeasures: DoS • Set network and host firewall filters for known bad traffic • Apply operating system patches for known vulnerabilities • Limit time and resources for processes • Monitor for threat activity on the network and host using Intrusion Detection Systems
Countermeasures: Hack The System • Use account and password policies • Reduce likelihood of password guessing or cracking • Limit privileges of users to those they need • Manage by responsibilities (group permissions) • Change default accounts, settings, passwords • Use restricted accounts for services (don’t run everything as administrator) • Apply operating system patches for known vulnerabilities • Turn off unnecessary services • Watch for social engineering
Countermeasures: Backdoor • Disable any unnecessary default accounts • Apply operating system patches for known vulnerabilities • Scan system periodically • Monitor system
Countermeasures: Memory Issues • Apply operating system patches for known vulnerabilities • Turn on security features (some operating systems will clear memory before reallocating it) • Reclaim memory on processtermination
Countermeasures: Escalation Of Privileges • Apply operating system patches for known vulnerabilities • Monitor system • Establish restricted accounts for services (don’t run everything as administrator)
Countermeasures: Default Settings • Disable unnecessary accounts and services • Apply operating system patches for known vulnerabilities • Follow lockdown procedures when possible • Monitor system
Additional Countermeasures • HIDS • Provides system monitoring function • Can raise alert when changes occur • Backups • Allow restoration of system to known good state • Physical security – Don’t allow unauthorized access to systems
Are We Done? • Not yet • Recurring theme • Apply operating system patches for known vulnerabilities • Disable unnecessary accounts and services • Monitor system • Always balance security and ease of use
Operating System Security: System Specific Stuff • History and general functions of operating systems • Major vulnerabilities and threats for operating systems • Steps in securing system accounts • Using a vulnerability scanner to test systems • Countermeasures for operating system threats