tailieunhanh - Lecture Operating system: Chapter 9 - TS. Nguyễn Văn Hiệp

Lecture "Operating system - Chapter 9: Security" has contents: The security environment, basics of cryptography, user authentication, attacks from inside the system, attacks from outside the system, protection mechanisms, trusted systems. | Security Chapter 9 The security environment Basics of cryptography User authentication Attacks from inside the system Attacks from outside the system Protection mechanisms Trusted systems The Security Environment Threats Security goals and threats Intruders Common Categories Casual prying by nontechnical users Snooping by insiders Determined attempt to make money Commercial or military espionage Accidental Data Loss Common Causes Acts of God fires, floods, wars Hardware or software errors CPU malfunction, bad disk, program bugs Human errors data entry, wrong tape mounted Basics of Cryptography Relationship between the plaintext and the ciphertext Monoalphabetic substitution each letter replaced by different letter Given the encryption key, easy to find decryption key Secret-key crypto called symmetric-key crypto Secret-Key Cryptography Public-Key Cryptography All users pick a public key/private key pair publish the public key private | Security Chapter 9 The security environment Basics of cryptography User authentication Attacks from inside the system Attacks from outside the system Protection mechanisms Trusted systems The Security Environment Threats Security goals and threats Intruders Common Categories Casual prying by nontechnical users Snooping by insiders Determined attempt to make money Commercial or military espionage Accidental Data Loss Common Causes Acts of God fires, floods, wars Hardware or software errors CPU malfunction, bad disk, program bugs Human errors data entry, wrong tape mounted Basics of Cryptography Relationship between the plaintext and the ciphertext Monoalphabetic substitution each letter replaced by different letter Given the encryption key, easy to find decryption key Secret-key crypto called symmetric-key crypto Secret-Key Cryptography Public-Key Cryptography All users pick a public key/private key pair publish the public key private key not published Public key is the encryption key private key is the decryption key One-Way Functions Function such that given formula for f(x) easy to evaluate y = f(x) But given y computationally infeasible to find x Digital Signatures Computing a signature block What the receiver gets (b) User Authentication Basic Principles. Authentication must identify: Something the user knows Something the user has Something the user is This is done before user can use the system Authentication Using Passwords (a) A successful login (b) Login rejected after name entered (c) Login rejected after name and password typed Authentication Using Passwords How a cracker broke into LBL a . Dept. of Energy research lab Authentication Using Passwords The use of salt to defeat precomputation of encrypted passwords Salt Password , , , , Authentication Using a Physical Object Magnetic cards magnetic stripe cards chip cards: stored value cards, smart cards Authentication .

TỪ KHÓA LIÊN QUAN