上海交通大学:操作系统安全(PPT课件讲稿)操作系统安全 OS Security(邹恒明)

★ ★★ Chapter 7: OS Security ★★ Instructor: Hengming Zou, Ph.D. CLACKs n Pursuit of Absolute simplici求于至筍,归于永恒二
1 Chapter 7: OS Security Instructor: Hengming Zou, Ph.D. In Pursuit of Absolute Simplicity求于至简,归于永恒

斗 长 Content ¥斗 ★★ o The securityenvironment o Basics of cryptography o User authentication s Intrusions and attacks o Protection mechanisms o Trusted systems
2 Content The security environment Basics of cryptography User authentication Intrusions and attacks Protection mechanisms Trusted systems

斗 长 Hardware Reality ¥斗 ★★ o Collection of processor, memory, disks, network interfaces that can be used by anyone to do anything o Or could tum it off, leaving you with hardware thatwon't do anything for anyone
3 Hardware Reality Collection of processor, memory, disks, network interfaces that can be used by anyone to do anything Or could turn it off, leaving you with hardware that won’t do anything for anyone

斗 长 Security Goals and Threats ¥斗 ★★ Goal Threat Data Confidentiali Exposure of data Data Integrity Tampering with data Personal Privacy Misuse of data System Availability Denial of service Acts of god
4 Security Goals and Threats Goal Threat Data Confidentiality Exposure of data Data Integrity Tampering with data Personal Privacy Misuse of data System Availability Denial of service Acts of God

斗 长 Security Threats ¥斗 ★★ s Natural or man-made disasters fires, floods, earthquake, wars o Hardware or software errors CPU malfunction, bad disk program bugs s Human errors dataentry, wrong tape mounted o Attacks by intruders or adversaries This is where we will focus in this lecture
5 Security Threats Natural or man-made disasters – fires, floods, earthquake, wars Hardware or software errors – CPU malfunction, bad disk, program bugs Human errors – data entry, wrong tape mounted Attacks by intruders or adversaries – This is where we will focus in this lecture

斗 长 Intrusion motive ¥斗 ★★ o Casual prying by non-technical users o Snooping by insiders o Determined attemptto make money o Commercial or militaryespionage
6 Intrusion Motive Casual prying by non-technical users Snooping by insiders Determined attempt to make money Commercial or military espionage

斗 长 Some Example Attacks ¥斗 ★★ o Spoof identity pretend to send a message from your IP address s Man-in-the-middle attack Eavesdrop and delete the original message Insert new message that pretends to be from original sender Replayold messages
7 Some Example Attacks Spoof identity – pretend to send a message from your IP address Man-in-the-middle attack – Eavesdrop and delete the original message – Insert new message that pretends to be from original sender – Replay old messages

斗 长 Security Elements ¥斗 ★★ o Data security not viewed by unauthorized personnel data are not tampered o System security Systems do not do things not supposed to do
8 Security Elements Data security – not viewed by unauthorized personnel – data are not tampered System security – Systems do not do things not supposed to do

斗 长 Security Elements ¥斗 ★★ o Static security Data stored are not compromised Achieved by access control and cryptography o Dynamic security Data in transit is not compromised Achieved by secure communication
9 Security Elements Static security – Data stored are not compromised – Achieved by access control and cryptography Dynamic security – Data in transit is not compromised – Achieved by secure communication

斗 长 Secure communication ¥斗 ★★ o Confidentiali Attacker should not be able to understand data ≈ Authentication: Assure receiver that message is from the right sender s Freshness. Attacker should not be able to replay an old request o Availability No denial-of-service
10 Secure Communication Confidentiality: – Attacker should not be able to understand data Authentication: – Assure receiver that message is from the right sender Freshness: – Attacker should not be able to replay an old request Availability: – No denial-of-service
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 《Computer Networking:A Top Down Approach》英文教材教学资源(PPT课件讲稿,3rd edition)Chapter 5 Link Layer and LANs.pps
- 《计算机网络安全》课程电子教案(PPT教学课件)第一章 计算机网络安全概述.ppt
- 并发程序精化验证及其应用(PPT讲稿)Refinement Verification of Concurrent Programs and Its Applications.pptx
- 《单片机原理与其应用》课程教学资源(PPT课件讲稿)第8章 单片机的存储器的扩展.pptx
- 南京大学:模型检验(PPT课件讲稿)model checking.pptx
- 苏州大学:《中文信息处理》课程教学资源(PPT课件讲稿)第二章 汉字代码体系.ppt
- 《C语言程序设计》课程教学资源(PPT课件讲稿)第4章 选择结构程序设计.ppt
- 《机器学习》课程教学资源(PPT课件讲稿)第六章 特征降维和选择.ppt
- 数据挖掘实现的住院病人的实时预警(PPT讲稿)Real-Time Clinical Warning for Hospitalized Patients via Data Mining.pptx
- 《PHP程序设计》教学资源(PPT课件讲稿)项目四 面向对象网站开发.ppt
- 《软件工程》课程教学资源(PPT课件讲稿)第3章 软件需求分析.ppt
- 四川大学:《操作系统 Operating System》课程教学资源(PPT课件讲稿)Chapter 3 Process Description and Control.ppt
- 随机图与复杂网络(PPT讲稿)随机演化博弈的算法研究及其在复杂网络中的应用.ppt
- 《计算机组成原理》课程教学资源(PPT课件讲稿)第四章 存储器.ppt
- 中国人民大学:《数据库系统概论 An Introduction to Database System》课程教学资源(PPT课件讲稿)第一章 绪论.ppt
- 《编译原理》课程教学资源(PPT课件讲稿)语法分析 Syntax analysis(自底向上分析 Bottom-Up Parsing).ppt
- 《计算机网络安全》课程教学资源(PPT课件讲稿)第二章 密码学技术.ppt
- 《软件工程》课程教学资源(PPT课件讲稿)第7章 软件测试.ppt
- 上海交通厌:《通信网络》课程教学资源(PPT讲稿)DELAY MODELS IN DATA NETWORKS、LITTLE’S LAW、ARRIVAL MODEL、M/M/X QUEUING MODELS.pptx
- 《高级语言程序设计》课程教学资源(试卷习题)试题四(无答案).doc
- 某高校计算机专业课程教学大纲合集(汇编).pdf
- 电子科技大学:《网络安全与网络工程》课程教学资源(PPT课件讲稿)第六章 杂凑函数(主讲:聂旭云).ppt
- 中国科学技术大学:《嵌入式操作系统 Embedded Operating Systems》课程教学资源(PPT课件讲稿)第六讲 死锁及其处理.ppt
- 西华大学:《电子商务概论》课程教学资源(PPT课件讲稿)第7章 电子商务物流.ppt
- 《软件工程》课程教学资源(PPT课件讲稿)第12章 软件开发工具StarUML及其应用.ppt
- 《计算机网络》课程PPT教学课件(Windows)第09讲 DNS服务.ppt
- 中国科学技术大学:《数据结构》课程教学资源(PPT课件讲稿)第三章 线性表.pps
- 西安理工大学:面向主题的服务(PPT讲稿)综合集成支撑平台业务化——互联网信息化(平台、内容、服务).ppt
- 《数据科学》课程教学资源(PPT课件讲稿)第2章 数据预处理.ppt
- 《计算机组成原理》课程教学资源(PPT课件讲稿)第2章 运算方法和运算器.ppt
- 《数据库系统原理》课程PPT教学课件(SQLServer)第12章 并发控制.ppt
- 关键词抽取、社会标签推荐及其在社会计算中的应用.pptx
- 克里特大学:The Application of Artificial Neural Networks in Engineering and Finance.ppt
- 山东大学:IPv6试商用的进展和挑战(PPT讲稿,网络与信息中心:秦丰林).pptx
- 清华大学:域内路由选择(PPT课件讲稿)Intra-domain routing.pptx
- 清华大学:TCP and Congestion Control(1).pptx
- 《人工智能技术导论》课程教学资源(PPT课件讲稿)第3章 图搜索与问题求解.ppt
- 《网页设计》课程教学资源:课程教学大纲.doc
- 西安电子科技大学:《操作系统 Operating Systems》课程教学资源(PPT课件讲稿)Chapter 04 Memory Management.ppt
- 中国水利水电出版社:《单片机原理及应用》课程PPT教学课件(C语言版)第8章 单片机系统扩展(主编:周国运).ppt