Şerban Mariuţa
Şerban Mariuţa
3
Programs, operating system, and database security and integrity
I. Overview
One of the fundamental concerns in the security of cyberspace and e-commerce is the security of operating
systems that are the core piece of software running in all information systems, such as network devices
(routers, firewalls, etc), Web servers, customer desktops, PDAs, and so on. Many of known vulnerabilities
discovered so far are rooted from the bugs or deficiency of underneath operating systems.
This module discusses the security (or lack of security) of most commercial operating systems like Unix and
Microsoft Windows, and its effect to the overall security of Web based applications and services. Based on
DOD’s trusted computer system model, the current effort toward development of secure operating systems
is presented, and as a case study, the publicly available security enhanced Linux, SE-Linux, is also analyzed.
II. Intended Learning Outcomes (ILOs)
Upon completion of this module, the students should be able to:
A. grasp the security of operating systems and database,
B. familiarize themselves with the functions of operating system,
C. evaluate operating system’s security; and
D. set file permission on files of windows operating system.
III. Learning Resources and References
-Cui-Qing Yang Version 1.4b, Option 1 for GSEC , Operating System Security and Secure Operating
Systems January 2003 (https://www.utc.edu/center-academic-excellence-cyber-defense/course-
listing/4670-lecture2-os.ppt)
- Vangie Beal /Windows Firewall / https://www.webopedia.com/TERM/W/windows-firewall.html
-Computer hope/File/https://www.computerhope.com/jargon/f/file.htm
Websites builder.com/December 14, 2019/https://websitebuilders.com/how-
to/glossary/file_permissions/
- Şerban Mariuţa/ Principles of Security and Integrity of Databases
/ Procedia Economics and Finance Volume 15, 2014, Pages 401-
405/https://www.sciencedirect.com/science/article/pii/S2212567114004651
Page 1 of 5
2. Key functions of an operating system:
a. Multitasking, multisharing
b. Computer resource management
c. Controls the flow of activities
d. Provides a user interface
e. Administers user actions and
accounts
f. Runs software utilities and
programs
g. Enforce security measures
h. Schedule jobs
i. Provide tools to configure the
operating system and hardware
a. Services
b. Files
-A file is an object on a computer that stores data, information, settings, or commands
used with a computer program. In a GUI (graphical user interface), such as Microsoft
Windows, files display as icons that relate to the program that opens the file. For example,
the picture is an icon associated with Adobe Acrobat PDF files. If this file was on your
computer, double-clicking the icon opens it in Adobe Acrobat or the PDF reader installed
on the computer.
● Common threats:
✔ File permission
✔ File sharing
● Files must be protected from unauthorized reading and writing actions
● Data resides in files; protecting files protects data
● File Permissions
-System settings that determine who can access specified files and what they can do
with those files.
When you place files on a web server, you can assign the files various levels of
permission for your users. Likewise, companies often use permissions to limit access to
their intranet resources. Permission levels vary by program, but in general you will see
the following types of permission:
● File Transfer
▪ FTP (File Transfer Protocol):
-Internet service for transferring files from one computer to another
-Transmits usernames and passwords in plaintext
-Root account cannot be used with FTP
-Anonymous FTP: ability to log on to the FTP server without being
authenticated
● Best practices:
▪ Use Secure FTP utility if possible
▪ Make two FTP directories:
✔ One for uploads with write permissions only
✔ One for downloads with read permissions only
▪ Use specific accounts with limited permissions
▪ Log and scan FTP activities
▪ Allow only authorized operations
● File Sharing
- Is the practice of distributing or providing access to digital media, such as computer
programs, multimedia (audio, images and video), documents or electronic books. File
sharing may be achieved in a number of ways. Common methods of storage,
transmission and dispersion include manual sharing utilizing removable media,
centralized servers on computer networks, World Wide Web-based hyperlinked
documents, and the use of distributed peer-to-peer networking.
c. Memory
-Hardware memory available on the system can be corrupted by badly written software
-Can harm data integrity
-Two options to avoid loss of data integrity:
● Stop using the program
Page 3 of 5
● Apply a patch (service pack) to fix it
4. Windows Firewall
- is a Microsoft Windows application that filters information coming to your system from the
Internet and blocking potentially harmful programs. The software blocks most programs from
communicating through the firewall. Users simply add a program to the list of allowed programs to
allow it to communicate through the firewall. When using a public network, Windows Firewall can
also secure the system by blocking all unsolicited attempts to connect to your computer.
5. Principles of Security and Integrity of Databases
All systems have ASSETS and security is about protecting assets. The first thing, then, is to
know your assets and their value. In this chapter, concentrate on database objects (tables, views,
rows), access to them, and the overall system that manages them. Note that not all data is
sensitive, so not all requires great effort at protection. All assets are under threat.
The second thing to know is what THREATs are putting your assets at risk. These include
things such as power failure and employee fraud. Note that threats are partly hypothetical,
always changing and always imperfectly known. Security activity is directed at protecting the
system from perceived threats.
If a threat is potential, you must allow for it to become an actuality. When it becomes actual
there is an IMPACT. Impact you can consider and plan for. But in the worst case, there will be a
LOSS. Security activity here is directed at minimizing the loss and recovering the database to
minimize the loss as well as further protecting from the same or similar threats.
https://www.youtube.com/watch?v=whUdwhW9VWw
VII. Assessment
Direction: Study the following items and try answering them seriously. A summative assessment similar to
these items will be given to you through our facebook group later.
1. Which of the following operating systems is free and open-source?
a. Windows b. Mac OS X
c. Linux d. UNIX
2. What is Operating System?
A. It acts as an interface between the hardware and application programs.
B. It is a collection of programs that manage hardware resources.
C. It is a system service provider to the application programs.
D. All of the above
3. Which of the following is an example of operating system?
a. MS Word b. MS DOS
c. MS Excel d. MS Access
4. OS stands for
a. Operating System b. Operating style
c. Orientation system d. Operating signal
a. Printer b. Database
c. Hardware d. System software
Page 5 of 5