Unit- 5 Notes
Unit- 5 Notes
21CSC202J
Option 4 – Lock-key
Compromise between access lists and capability lists
Each object has list of unique bit patterns, called locks
Each domain as list of unique bit patterns called keys
Process
in a domain can only access object if domain has key that
matches one of the locks
Access Control
Protection can be applied to non-file
resources
Oracle Solaris 10 provides role-based
access control (RBAC) to implement
least privilege
Privilege is right to execute system call or use
an option within a system call
Can be assigned to processes
Users assigned roles granting access to
privileges and programs
Enable role via password to gain its privileges
Similar to access matrix
Capability-Based Systems
Hydra and CAP were first capability-based systems
Now included in Linux, Android and others, based on POSIX.1e (that never became a
standard)
Essentially slices up root powers into distinct areas, each represented by a bitmap bit
Fine grain control over privileged operations can be achieved by setting or masking the
bitmap
Three sets of bitmaps – permitted, effective, and inheritable
Can apply per process or per thread
Once revoked, cannot be reacquired
Process or thread starts with all privs, voluntarily decreases set during execution
Essentially a direct implementation of the principle of least privilege
An improvement over root having all privileges but inflexible (adding new privilege
difficult, etc.)
Language-Based Protection
Specification of protection in a programming language allows the high-level
description of policies for the allocation and use of resources
Denial of Service
Overload the targeted computer preventing it from doing any useful
work
Distributed Denial-of-Service (DDoS) come from multiple sites at once
Cryptography as a Security Tool
Broadest security tool available
Internal to a given computer, source and destination of messages can be known
and protected
OS creates, manages, protects process IDs, communication ports
Source and destination of messages on network cannot be trusted without
cryptography
Practice safe computing – avoid sources of infection, download from only “good” sites, etc
Firewalling to Protect Systems and Networks
A network firewall is placed between trusted and untrusted hosts
The firewall limits network access between these two security domains
Can be tunneled or spoofed
Tunneling allows disallowed protocol to travel within allowed protocol (i.e., telnet
inside of HTTP)
Firewall rules typically based on host name or IP address which can be spoofed
Personal firewall is software layer on given host
Can monitor / limit traffic to and from the host
Application proxy firewall understands application protocol and can
control them (i.e., SMTP)
System-call firewall monitors all important system calls and apply rules to
them (i.e., this program can execute that system call)
Computer-Security Classifications
U.S. Department of Defense outlines four divisions of computer security: A,
B, C, and D
D – Minimal security
C – Provides discretionary protection through auditing
Divided into C1 and C2
C1 identifies cooperating users with the same level of protection
C2 allows user-level access control