SlideShare a Scribd company logo
Computer Network Security 1
Protection in OS
A brief history
There were no Operating Systems
Programs were entered by users by means of switches
Programs were entered by means of inputs devices like
keyboards
Each user had exclusive access to the computing system
Time sharing
Required to load libraries, compilers, linkers, assemblers
and then clean up for the next user by removing sensitive
code or data
Computer Network Security 2
A brief history
The first OS were simple utilities called executives
Designed to assist programmers and to smooth user to user
transition
Provided linkers and loaders, compilers and assemblers,
and automatic loading of subprograms from libraries
Multiprogramming allowed two users to interleave access
to resources of a single computing system
Researchers developed scheduling, sharing and parallel
use
Computer Network Security 3
A brief history
Multiprogramming OSs, called monitors oversaw each
program’s execution
While an executive stayed in the background, waiting to be
called into action by the user, a monitor maintained control
of the computing system and gave access to a resource
only if consistent with good use of the system User
Multiprogramming brought complications: one user
making a mistake on an executive would feel foolish, but a
user could not adversely affect the computation of another
user
Computer Network Security 4
User authentication
An OS bases much of its protection on knowing who a
user of the system is
In real-life, you may ask for an ID before cashing a
cheque, or issuing a book
Over time organizations and systems have developed
means of authentication: documents, voice recognition,
fingerprint, retina matching etc
In computing, the choices are limited and possibilities are
less secure. Anyone can attempt to login to a computing
system.
A computer can not recognize electrical signals as one
person being any different from another
Computer Network Security 5
User authentication
Most computer authentication systems must be based on
something only shared between the user and the computer
Authentication mechanism based on:
Something the user knows: passwords, PINs, mother’s maiden name
Something the user has: identity badges, physical keys, driver’s license
Something the user is: biometrics are based on a physical characteristic of
the user, such as a fingerprint, the pattern of a person's voice.
Two or more forms can be combined for strong security
for example, a bank card and a PIN
Computer Network Security 6
Use of passwords
The most common authentication mechanism for
user to operating system is a password
Mutually agreed upon code words, assumed to be
known only to the system and the user
Seems to offer relatively secure system
BUT: human practice sometimes degrades its
quality
Computer Network Security 7
Passwords: loose-lipped systems
Consider a would-be intruder:
Knows nothing of the system
Enter a common name as user name
• Invalid user name
• Password dialog
Enter a guessed password
Intruder finds out OS, valid user name
Computer Network Security 8
Passwords: additional
authentication information
Day and time of access
Location of access
Computer Network Security 9
Attacks on passwords
Passwords are somewhat limited as protection
devices due to relatively small number of bits of
information they contain.
Here are some ways you might be able to
determine a user's password.
Try all possible passwords
Try many probable passwords
Try passwords likely for the user
Search for the system list of passwords
Ask the user
Computer Network Security 10
Exhaustive attack: brute force
All possible passwords: usually automated
If a system has a maximum password length of 8
alphabets (26 possibilities):
261
one-character
262
two-character
268
eight-character
26+ 262
+…….+ 268
=5 million
At one password per milliseconds, it will take only
150 years to try all possibilities
At one password per microseconds, only two
months
Computer Network Security 11
Probable passwords
We prefer smaller passwords that are easy to remember,
spell and pronounce
At one password per million, it takes only 18.278 seconds
for three character passwords Or about 8 minutes for 4
character Or about 3.5 hours for 5 character
This analysis assumes that people choose passwords like
vxlag and msms as often as they pick enter and boring
However, people tend to choose names or words they can
remember
Programs contain dictionaries of English words
It takes only 80 seconds to test all 80,000 words in a
dictionary as passwords
Computer Network Security 12
Passwords likely for a user
People choose passwords that is meaningful to
them
Spouse name
Child’s name
Brother or sister’s name
Pet’s name
Street name
Trying this list takes under a second
One can try ten of these by hand in under two
minutes
Computer Network Security 13
Weak passwords
Several web sites post dictionaries of phrases, science
fiction characters, places, mythological names, Chinese
words, Yiddish words, and other specialized lists
These help admins identify weak passwords but the same
dictionaries can also be used by attackers of sites that do
not have such attentive administrators.
Tools such as COPS, Crack, and Satan allow an admin to
scan a system for weak passwords
People think they can be clever by picking a simple
password and replacing certain characters such as 0 for o,
1 for I or l, 3 for E, or @ for a
Computer Network Security 14
Steps an attacker would take
Here are attackers some password guessing steps:
No password
Same as user id
User name or derived from it
Common: password, secret, private, asdfg, aaaaa
Short college dictionary
Complete English word list
Common non-English dictionary
Computer Network Security 15
Steps an attacker would take
Short college dictionary with capitalizations: PaSsWoRd
and substitutions of 0 for o etc
Complete English with capitalization and substitutions
Common non-English dictionary with capitalization and
substitutions
Brute force, lowercase alphabetic
Brute force, full character set
Computer Network Security 16
Plaintext system password list
To validate passwords, a system must have
a way of comparing entries with actual
passwords
Rather than trying to guess the password
why not target the password file
Two column: user ID, password
Too obvious: Don’t leave out in the open
Have to protect it
Computer Network Security 17
Protecting plaintext password file
Various security approaches are used to conceal
the password table from those who should not see
it.
Strong access controls
Only OS can access it
Not every OS module needs access, e.g. the operating
system scheduler, accounting routines, or storage
manager have no need to know the table's contents.
Avoid dumping of memory
An attacker may carefully time the dump of memory
Protect system backups
Computer Network Security 18
Encrypted password file
Conventional encryption
One-way hash
Computer Network Security 19
Conventional encryption
Receive user password, decrypt stored
password and compare
But plain text password is available in
memory for a while That is, the password is
available to anyone who could obtain
access to all of memory.
Safer to use one-way hash
Computer Network Security 20
One-way hash
The password table's entries are encrypted by a
one-way encryption and then stored. When the
user enters a password, it is also encrypted and
then compared with the table. If the two values are
equal, the authentication succeeds.
Unix password file can be read by anyone, unless
special access controls have been installed.
What if two people choose the same password?
I notice that another user’s hashed password is the
same as mine in the file
Computer Network Security 21
One-way hash - salt
Unix circumvents this vulnerability by using a
password extension, called the salt.
Salt is a 12-bit number derived from the current
system time and the process id
Likely to be unique for every user
Concatenate salt and plaintext password, then hash
it
Store hash with salt
User enters password, fetch salt from file, hash
and compare
Computer Network Security 22
Indiscreet users
Tape to the monitor
Card inside the top desk
Give away for sharing files
Computer Network Security 23
Password selection criteria
Use characters other than alphabets
Choose long passwords
Avoid actual names or words
Choose an unlikely password: 2BrnB
Change password regularly
Don’t write down
Don’t tell anyone else
Computer Network Security 24
Good password choices
Some systems help users by providing
meaningless but choices of pronounceable
passwords. e.g. VAX VMS
Easy to forget and misspell: bliptab
Some systems encourage users to change
passwords frequently
Warn a few days ahead of expiry
Leave no choice on day of expiry
Computer Network Security 25
One-time passwords
Changes every time it is used
Assign a static mathematical function, the system provides an
argument to the function, and the user computes and returns the
function value. Such systems are also called challenge-response
systems
f(x)=x+1, f(x)=3x2
-9x+2, f(x)=px, px is the xth
prime number
f(x)=r(x) use x as seed to a random number generator, or the xth
random numbers
f(a1a2a3a4a5a6)=a3a1a1a4
f(E(x))=E(D(E(x))+1) System provides encrypted value, decrypt,
perform arithmetic, re-encrypt
One-time passwords are very effective because intercepted passwords
are useless
Computer Network Security 26
Authentication process
Even a terrible typist should be able to type
password correctly in a few tries
A legitimate user will not complain on a
delay of 5 to 10 seconds
A penetrator’s job would be made
unfeasible
Repeated failure = not authorized user
Computer Network Security 27
Fixing flaws
Trojan horse: a program displays standard prompt
e.g. SYSTEM ERROR, DISCONNECTED
Make sure system is reinitialized
Turn terminal off and then on
Pressing break key
Ctrl+alt+del
System could display something only the user and
the system know, such as last login time
Computer Network Security 28
ANY QUESTIONS
?

More Related Content

PPT
Unit 1 - Introduction to Software Engineering.ppt
PPTX
Context model
PPTX
Unix operating system architecture with file structure
PPTX
Linux operating system - Overview
PPT
Ch02 System Threats and Risks
PPTX
Fault avoidance and fault tolerance
PPTX
Law and Ethics in Information Security.pptx
PPTX
Password management
Unit 1 - Introduction to Software Engineering.ppt
Context model
Unix operating system architecture with file structure
Linux operating system - Overview
Ch02 System Threats and Risks
Fault avoidance and fault tolerance
Law and Ethics in Information Security.pptx
Password management

What's hot (20)

PPTX
Operating system windows XP
PPT
Cyber security for an organization
PPT
User Interface Design in Software Engineering SE15
PDF
PPT
Cocomo model
PPTX
12 security policies
PPTX
Human Computer Interaction - Interaction Design
PPT
System Analysis and Design
PPTX
User interface design
PPT
Ethics in IT Security
DOC
Srs example webapp
PPT
HCI 3e - Ch 7: Design rules
PPTX
Historical social & economic context of computing
PPT
Chapter_03.ppt
PPT
Hypertext, multimedia and www
PDF
Software Engineering : Requirement Analysis & Specification
PPTX
College Department Management System
PPTX
Text Editor in System software
PPTX
windows 10
Operating system windows XP
Cyber security for an organization
User Interface Design in Software Engineering SE15
Cocomo model
12 security policies
Human Computer Interaction - Interaction Design
System Analysis and Design
User interface design
Ethics in IT Security
Srs example webapp
HCI 3e - Ch 7: Design rules
Historical social & economic context of computing
Chapter_03.ppt
Hypertext, multimedia and www
Software Engineering : Requirement Analysis & Specification
College Department Management System
Text Editor in System software
windows 10
Ad

Viewers also liked (8)

PDF
Street involved youth
PPTX
Alpha Harmreduction 2
PPTX
Community impact of the towards patient centered addiction care project
PDF
Working with street involved pregnant women
PDF
Street involved pregnant women part 2
PPT
Lecture 6
PPT
Understanding operating systems 5th ed ch01
PPT
Os Swapping, Paging, Segmentation and Virtual Memory
Street involved youth
Alpha Harmreduction 2
Community impact of the towards patient centered addiction care project
Working with street involved pregnant women
Street involved pregnant women part 2
Lecture 6
Understanding operating systems 5th ed ch01
Os Swapping, Paging, Segmentation and Virtual Memory
Ad

Similar to Lecture 4 (20)

PDF
Authetication ppt
PPTX
computer security authorization Authentication.pptx
PPTX
Security and protection
PPTX
05-Authentication.pptx Software Security
PPT
20-security.ppt
PPTX
Network and system administration Chapter 5.pptx
PDF
How to Design Passwords
PPTX
Personal Internet Security System
PPTX
Protection in general purpose operating system
PPTX
chapter 7.pptx
PPTX
Communication security
PPTX
System Security
PPTX
Survey of file protection techniques
PDF
Network security
PPTX
chap13_authentication_programming_basics_(1).pptx
PPT
Information Security Audit and Analysis Module
PPT
Network security
PDF
User Authentication: Passwords and Beyond
PPT
MyTutorialON Cryptography.ppt
Authetication ppt
computer security authorization Authentication.pptx
Security and protection
05-Authentication.pptx Software Security
20-security.ppt
Network and system administration Chapter 5.pptx
How to Design Passwords
Personal Internet Security System
Protection in general purpose operating system
chapter 7.pptx
Communication security
System Security
Survey of file protection techniques
Network security
chap13_authentication_programming_basics_(1).pptx
Information Security Audit and Analysis Module
Network security
User Authentication: Passwords and Beyond
MyTutorialON Cryptography.ppt

More from Education (11)

PDF
A friendly introduction to differential equations
PDF
High-order Assembly Language/Shuttle (HAL/S)
PDF
assembly language programming and organization of IBM PC" by YTHA YU
PDF
Program security chapter 3
PDF
Network security chapter 1,2
PPT
Lecture 7
PPT
Lecture 5
PPT
Lecture 3
PPT
Lecture 2
PPT
Lecture 1
PDF
Data warehousing labs maunal
A friendly introduction to differential equations
High-order Assembly Language/Shuttle (HAL/S)
assembly language programming and organization of IBM PC" by YTHA YU
Program security chapter 3
Network security chapter 1,2
Lecture 7
Lecture 5
Lecture 3
Lecture 2
Lecture 1
Data warehousing labs maunal

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Well-logging-methods_new................
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT
Mechanical Engineering MATERIALS Selection
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Welding lecture in detail for understanding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
bas. eng. economics group 4 presentation 1.pptx
additive manufacturing of ss316l using mig welding
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Well-logging-methods_new................
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mechanical Engineering MATERIALS Selection
Model Code of Practice - Construction Work - 21102022 .pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Welding lecture in detail for understanding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
bas. eng. economics group 4 presentation 1.pptx

Lecture 4

  • 1. Computer Network Security 1 Protection in OS A brief history There were no Operating Systems Programs were entered by users by means of switches Programs were entered by means of inputs devices like keyboards Each user had exclusive access to the computing system Time sharing Required to load libraries, compilers, linkers, assemblers and then clean up for the next user by removing sensitive code or data
  • 2. Computer Network Security 2 A brief history The first OS were simple utilities called executives Designed to assist programmers and to smooth user to user transition Provided linkers and loaders, compilers and assemblers, and automatic loading of subprograms from libraries Multiprogramming allowed two users to interleave access to resources of a single computing system Researchers developed scheduling, sharing and parallel use
  • 3. Computer Network Security 3 A brief history Multiprogramming OSs, called monitors oversaw each program’s execution While an executive stayed in the background, waiting to be called into action by the user, a monitor maintained control of the computing system and gave access to a resource only if consistent with good use of the system User Multiprogramming brought complications: one user making a mistake on an executive would feel foolish, but a user could not adversely affect the computation of another user
  • 4. Computer Network Security 4 User authentication An OS bases much of its protection on knowing who a user of the system is In real-life, you may ask for an ID before cashing a cheque, or issuing a book Over time organizations and systems have developed means of authentication: documents, voice recognition, fingerprint, retina matching etc In computing, the choices are limited and possibilities are less secure. Anyone can attempt to login to a computing system. A computer can not recognize electrical signals as one person being any different from another
  • 5. Computer Network Security 5 User authentication Most computer authentication systems must be based on something only shared between the user and the computer Authentication mechanism based on: Something the user knows: passwords, PINs, mother’s maiden name Something the user has: identity badges, physical keys, driver’s license Something the user is: biometrics are based on a physical characteristic of the user, such as a fingerprint, the pattern of a person's voice. Two or more forms can be combined for strong security for example, a bank card and a PIN
  • 6. Computer Network Security 6 Use of passwords The most common authentication mechanism for user to operating system is a password Mutually agreed upon code words, assumed to be known only to the system and the user Seems to offer relatively secure system BUT: human practice sometimes degrades its quality
  • 7. Computer Network Security 7 Passwords: loose-lipped systems Consider a would-be intruder: Knows nothing of the system Enter a common name as user name • Invalid user name • Password dialog Enter a guessed password Intruder finds out OS, valid user name
  • 8. Computer Network Security 8 Passwords: additional authentication information Day and time of access Location of access
  • 9. Computer Network Security 9 Attacks on passwords Passwords are somewhat limited as protection devices due to relatively small number of bits of information they contain. Here are some ways you might be able to determine a user's password. Try all possible passwords Try many probable passwords Try passwords likely for the user Search for the system list of passwords Ask the user
  • 10. Computer Network Security 10 Exhaustive attack: brute force All possible passwords: usually automated If a system has a maximum password length of 8 alphabets (26 possibilities): 261 one-character 262 two-character 268 eight-character 26+ 262 +…….+ 268 =5 million At one password per milliseconds, it will take only 150 years to try all possibilities At one password per microseconds, only two months
  • 11. Computer Network Security 11 Probable passwords We prefer smaller passwords that are easy to remember, spell and pronounce At one password per million, it takes only 18.278 seconds for three character passwords Or about 8 minutes for 4 character Or about 3.5 hours for 5 character This analysis assumes that people choose passwords like vxlag and msms as often as they pick enter and boring However, people tend to choose names or words they can remember Programs contain dictionaries of English words It takes only 80 seconds to test all 80,000 words in a dictionary as passwords
  • 12. Computer Network Security 12 Passwords likely for a user People choose passwords that is meaningful to them Spouse name Child’s name Brother or sister’s name Pet’s name Street name Trying this list takes under a second One can try ten of these by hand in under two minutes
  • 13. Computer Network Security 13 Weak passwords Several web sites post dictionaries of phrases, science fiction characters, places, mythological names, Chinese words, Yiddish words, and other specialized lists These help admins identify weak passwords but the same dictionaries can also be used by attackers of sites that do not have such attentive administrators. Tools such as COPS, Crack, and Satan allow an admin to scan a system for weak passwords People think they can be clever by picking a simple password and replacing certain characters such as 0 for o, 1 for I or l, 3 for E, or @ for a
  • 14. Computer Network Security 14 Steps an attacker would take Here are attackers some password guessing steps: No password Same as user id User name or derived from it Common: password, secret, private, asdfg, aaaaa Short college dictionary Complete English word list Common non-English dictionary
  • 15. Computer Network Security 15 Steps an attacker would take Short college dictionary with capitalizations: PaSsWoRd and substitutions of 0 for o etc Complete English with capitalization and substitutions Common non-English dictionary with capitalization and substitutions Brute force, lowercase alphabetic Brute force, full character set
  • 16. Computer Network Security 16 Plaintext system password list To validate passwords, a system must have a way of comparing entries with actual passwords Rather than trying to guess the password why not target the password file Two column: user ID, password Too obvious: Don’t leave out in the open Have to protect it
  • 17. Computer Network Security 17 Protecting plaintext password file Various security approaches are used to conceal the password table from those who should not see it. Strong access controls Only OS can access it Not every OS module needs access, e.g. the operating system scheduler, accounting routines, or storage manager have no need to know the table's contents. Avoid dumping of memory An attacker may carefully time the dump of memory Protect system backups
  • 18. Computer Network Security 18 Encrypted password file Conventional encryption One-way hash
  • 19. Computer Network Security 19 Conventional encryption Receive user password, decrypt stored password and compare But plain text password is available in memory for a while That is, the password is available to anyone who could obtain access to all of memory. Safer to use one-way hash
  • 20. Computer Network Security 20 One-way hash The password table's entries are encrypted by a one-way encryption and then stored. When the user enters a password, it is also encrypted and then compared with the table. If the two values are equal, the authentication succeeds. Unix password file can be read by anyone, unless special access controls have been installed. What if two people choose the same password? I notice that another user’s hashed password is the same as mine in the file
  • 21. Computer Network Security 21 One-way hash - salt Unix circumvents this vulnerability by using a password extension, called the salt. Salt is a 12-bit number derived from the current system time and the process id Likely to be unique for every user Concatenate salt and plaintext password, then hash it Store hash with salt User enters password, fetch salt from file, hash and compare
  • 22. Computer Network Security 22 Indiscreet users Tape to the monitor Card inside the top desk Give away for sharing files
  • 23. Computer Network Security 23 Password selection criteria Use characters other than alphabets Choose long passwords Avoid actual names or words Choose an unlikely password: 2BrnB Change password regularly Don’t write down Don’t tell anyone else
  • 24. Computer Network Security 24 Good password choices Some systems help users by providing meaningless but choices of pronounceable passwords. e.g. VAX VMS Easy to forget and misspell: bliptab Some systems encourage users to change passwords frequently Warn a few days ahead of expiry Leave no choice on day of expiry
  • 25. Computer Network Security 25 One-time passwords Changes every time it is used Assign a static mathematical function, the system provides an argument to the function, and the user computes and returns the function value. Such systems are also called challenge-response systems f(x)=x+1, f(x)=3x2 -9x+2, f(x)=px, px is the xth prime number f(x)=r(x) use x as seed to a random number generator, or the xth random numbers f(a1a2a3a4a5a6)=a3a1a1a4 f(E(x))=E(D(E(x))+1) System provides encrypted value, decrypt, perform arithmetic, re-encrypt One-time passwords are very effective because intercepted passwords are useless
  • 26. Computer Network Security 26 Authentication process Even a terrible typist should be able to type password correctly in a few tries A legitimate user will not complain on a delay of 5 to 10 seconds A penetrator’s job would be made unfeasible Repeated failure = not authorized user
  • 27. Computer Network Security 27 Fixing flaws Trojan horse: a program displays standard prompt e.g. SYSTEM ERROR, DISCONNECTED Make sure system is reinitialized Turn terminal off and then on Pressing break key Ctrl+alt+del System could display something only the user and the system know, such as last login time
  • 28. Computer Network Security 28 ANY QUESTIONS ?