SlideShare uma empresa Scribd logo
1 de 56
Security Chapter  6.1 9.1 The security environment  9.2 Basics of cryptography  9.3 User authentication  9.4 Attacks from inside the system  9.5 Attacks from outside the system  9.6 Protection mechanisms  9.7 Trusted systems
The Security Environment Threats ,[object Object]
Intruders ,[object Object],[object Object],[object Object],[object Object],[object Object]
Accidental Data Loss ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basics of Cryptography ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Secret-Key Cryptography
Public-Key Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object]
One-Way Functions ,[object Object],[object Object],[object Object],[object Object]
Digital Signatures ,[object Object],[object Object],(b)
User Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication Using Passwords ,[object Object],[object Object],[object Object]
Authentication Using Passwords ,[object Object],[object Object]
Authentication Using Passwords ,[object Object],[object Object],Salt Password , , , ,
Authentication Using a Physical Object ,[object Object],[object Object],[object Object]
Authentication Using Biometrics ,[object Object]
Countermeasures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operating System Security Trojan Horses ,[object Object],[object Object],[object Object],[object Object]
Login Spoofing ,[object Object],[object Object]
Logic Bombs ,[object Object],[object Object],[object Object],[object Object]
Trap Doors ,[object Object],[object Object]
Buffer Overflow ,[object Object],[object Object],[object Object]
Generic Security Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Famous Security Flaws ,[object Object],(a) (b) (c)
Design Principles for Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],And …  keep it simple
Network Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virus Damage Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Viruses Work (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Viruses Work (2) ,[object Object],[object Object],[object Object]
How Viruses Work (3) ,[object Object],[object Object],[object Object],[object Object]
How Viruses Work (4) ,[object Object],[object Object],[object Object]
How Viruses Spread ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Antivirus and Anti-Antivirus Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object]
Antivirus and Anti-Antivirus Techniques ,[object Object],[object Object]
Antivirus and Anti-Antivirus Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet Worm ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Code (1) Sandboxing ,[object Object],[object Object]
Mobile Code (2) ,[object Object]
Mobile Code (3) ,[object Object]
Java Security (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Java Security (2) ,[object Object]
Protection Mechanisms   Protection Domains (1) ,[object Object]
Protection Domains (2) ,[object Object]
Protection Domains (3) ,[object Object]
Access Control Lists (1) ,[object Object]
Access Control Lists (2) ,[object Object]
Capabilities (1) ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Capabilities (2) f(Objects, Rights, Check) Rights Object Server
Trusted Systems Trusted Computing Base ,[object Object]
Formal Models of Secure Systems ,[object Object],[object Object]
Multilevel Security (1) ,[object Object]
Multilevel Security (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Orange Book Security (1) ,[object Object],[object Object]
Orange Book Security (2)
Covert Channels (1) Client, server and collaborator processes Encapsulated server can still leak to collaborator via covert channels
Covert Channels (2) ,[object Object]
Covert Channels (3) ,[object Object],[object Object],[object Object],Zebras Hamlet, Macbeth, Julius Caesar Merchant of Venice, King Lear

Mais conteúdo relacionado

Mais procurados

The Future of Automated Malware Generation
The Future of Automated Malware GenerationThe Future of Automated Malware Generation
The Future of Automated Malware Generation
Stephan Chenette
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacks
UltraUploader
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
Google
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
webhostingguy
 

Mais procurados (20)

Program security
Program securityProgram security
Program security
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Ch14 security
Ch14   securityCh14   security
Ch14 security
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
 
The Future of Automated Malware Generation
The Future of Automated Malware GenerationThe Future of Automated Malware Generation
The Future of Automated Malware Generation
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Automated defense from rootkit attacks
Automated defense from rootkit attacksAutomated defense from rootkit attacks
Automated defense from rootkit attacks
 
Windows network
Windows networkWindows network
Windows network
 
Automating malware analysis
Automating malware analysis Automating malware analysis
Automating malware analysis
 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzing
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
 
Skywiper
SkywiperSkywiper
Skywiper
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
 

Destaque (20)

Twitter - Comunicare e Raccontarsi nel Web Social
Twitter - Comunicare e Raccontarsi nel Web SocialTwitter - Comunicare e Raccontarsi nel Web Social
Twitter - Comunicare e Raccontarsi nel Web Social
 
Presentazione Netlife s.r.l.
Presentazione Netlife s.r.l.Presentazione Netlife s.r.l.
Presentazione Netlife s.r.l.
 
Social Silver Surfer
Social Silver SurferSocial Silver Surfer
Social Silver Surfer
 
Comunicare nel web 2.0
Comunicare nel web 2.0Comunicare nel web 2.0
Comunicare nel web 2.0
 
Wikipedia in outreach
Wikipedia in outreachWikipedia in outreach
Wikipedia in outreach
 
Op Sy 03 Ch 00
Op Sy 03 Ch 00Op Sy 03 Ch 00
Op Sy 03 Ch 00
 
Future Uses Of Computers Powerpoint
Future  Uses Of  Computers  PowerpointFuture  Uses Of  Computers  Powerpoint
Future Uses Of Computers Powerpoint
 
Night Settings
Night SettingsNight Settings
Night Settings
 
Op Sy 03 Ch 25
Op Sy 03 Ch 25Op Sy 03 Ch 25
Op Sy 03 Ch 25
 
p-Health_2007
p-Health_2007p-Health_2007
p-Health_2007
 
Intro-to-scrum
Intro-to-scrumIntro-to-scrum
Intro-to-scrum
 
Computers
ComputersComputers
Computers
 
School Uniforms
School UniformsSchool Uniforms
School Uniforms
 
Latinisms A Inoa
Latinisms A InoaLatinisms A Inoa
Latinisms A Inoa
 
Latinisms Alfonso
Latinisms AlfonsoLatinisms Alfonso
Latinisms Alfonso
 
Full Page Photo
Full Page PhotoFull Page Photo
Full Page Photo
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
School Uniforms
School UniformsSchool Uniforms
School Uniforms
 
Be social
Be socialBe social
Be social
 
Brazen Careerist
Brazen CareeristBrazen Careerist
Brazen Careerist
 

Semelhante a Op Sy 03 Ch 61

Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
C.U
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
bora.gungoren
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 

Semelhante a Op Sy 03 Ch 61 (20)

OSCh19
OSCh19OSCh19
OSCh19
 
OS_Ch19
OS_Ch19OS_Ch19
OS_Ch19
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
 
Communication security
Communication securityCommunication security
Communication security
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Cloud Computing & Security
Cloud Computing & SecurityCloud Computing & Security
Cloud Computing & Security
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Attacking antivirus
Attacking antivirusAttacking antivirus
Attacking antivirus
 
Malware
MalwareMalware
Malware
 
Data security
Data securityData security
Data security
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Ch19
Ch19Ch19
Ch19
 

Mais de Google

Op Sy 03 Ch 101
Op Sy 03 Ch 101Op Sy 03 Ch 101
Op Sy 03 Ch 101
Google
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
Google
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
Google
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
Google
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
Google
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Google
 
Op Sy 03 Ch 01
Op Sy 03 Ch 01Op Sy 03 Ch 01
Op Sy 03 Ch 01
Google
 
Op Sy 03 Ch 21
Op Sy 03 Ch 21Op Sy 03 Ch 21
Op Sy 03 Ch 21
Google
 
Op Sy 03 Ch 22
Op Sy 03 Ch 22Op Sy 03 Ch 22
Op Sy 03 Ch 22
Google
 
Op Sy 03 Ch 23
Op Sy 03 Ch 23Op Sy 03 Ch 23
Op Sy 03 Ch 23
Google
 
Op Sy 03 Ch 24
Op Sy 03 Ch 24Op Sy 03 Ch 24
Op Sy 03 Ch 24
Google
 
Op Sy 03 Ch 31
Op Sy 03 Ch 31Op Sy 03 Ch 31
Op Sy 03 Ch 31
Google
 
Op Sy 03 Ch 32
Op Sy 03 Ch 32Op Sy 03 Ch 32
Op Sy 03 Ch 32
Google
 
Op Sy 03 Ch 33
Op Sy 03 Ch 33Op Sy 03 Ch 33
Op Sy 03 Ch 33
Google
 
Op Sy 03 Ch 41
Op Sy 03 Ch 41Op Sy 03 Ch 41
Op Sy 03 Ch 41
Google
 
Op Sy 03 Ch 51
Op Sy 03 Ch 51Op Sy 03 Ch 51
Op Sy 03 Ch 51
Google
 
Op Sy 03 Ch 71
Op Sy 03 Ch 71Op Sy 03 Ch 71
Op Sy 03 Ch 71
Google
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
Google
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
Google
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
Google
 

Mais de Google (20)

Op Sy 03 Ch 101
Op Sy 03 Ch 101Op Sy 03 Ch 101
Op Sy 03 Ch 101
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Op Sy 03 Ch 01
Op Sy 03 Ch 01Op Sy 03 Ch 01
Op Sy 03 Ch 01
 
Op Sy 03 Ch 21
Op Sy 03 Ch 21Op Sy 03 Ch 21
Op Sy 03 Ch 21
 
Op Sy 03 Ch 22
Op Sy 03 Ch 22Op Sy 03 Ch 22
Op Sy 03 Ch 22
 
Op Sy 03 Ch 23
Op Sy 03 Ch 23Op Sy 03 Ch 23
Op Sy 03 Ch 23
 
Op Sy 03 Ch 24
Op Sy 03 Ch 24Op Sy 03 Ch 24
Op Sy 03 Ch 24
 
Op Sy 03 Ch 31
Op Sy 03 Ch 31Op Sy 03 Ch 31
Op Sy 03 Ch 31
 
Op Sy 03 Ch 32
Op Sy 03 Ch 32Op Sy 03 Ch 32
Op Sy 03 Ch 32
 
Op Sy 03 Ch 33
Op Sy 03 Ch 33Op Sy 03 Ch 33
Op Sy 03 Ch 33
 
Op Sy 03 Ch 41
Op Sy 03 Ch 41Op Sy 03 Ch 41
Op Sy 03 Ch 41
 
Op Sy 03 Ch 51
Op Sy 03 Ch 51Op Sy 03 Ch 51
Op Sy 03 Ch 51
 
Op Sy 03 Ch 71
Op Sy 03 Ch 71Op Sy 03 Ch 71
Op Sy 03 Ch 71
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 

Op Sy 03 Ch 61

  • 1. Security Chapter 6.1 9.1 The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from outside the system 9.6 Protection mechanisms 9.7 Trusted systems
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 54. Covert Channels (1) Client, server and collaborator processes Encapsulated server can still leak to collaborator via covert channels
  • 55.
  • 56.