What is Security?
It is the collective name given to tools, resources and administrative procedures that are designed to protect computing data and services
What are the four key areas to protect?
Protection
-Access to the data must be controlled
User Authentication
-Access to the computer facility must be controlled
Network Security
-Data must be securely transmitted through networks
File Security
-Sensitive files must be secure
What are the four types of generic computer threat?
Interruption
-System assets become unavailable (e.g. cutting off connection)
Interception
-Unauthorized access to system asset (e.g. hacker copying files)
Modification
-Unauthorized modification to a system asset (e.g. virus changing a program or destroying data)
Fabrication
-Unauthorized faking of an object in the system (e.g. adding records to a file)
What is a virus?
It is a small program that can attach itself to an existing program. When the infected program is run, the virus code is also run. When a virus is run, it can try and replicate itself. If it runs fast enough, the user is unlikely to notice it
What is a Stealth Virus?
It is a virus which attempts to cover itself up. One way is to compress the original file so it still appears to be the same size
What are five security design principles?
What is Least Privilege Security?
What is Small, Uniform security?
- part of design, rather than ad-hoc
What is Acceptability of security measures taken?
- if security mechanisms are difficult to use, they might be ignored
What is Complete Mediation?
- including those during maintenance
What is Open Design?
What are the two types of protection?
- Data-oriented control of access
What is User-oriented control of access?
Most common version of this is login. Where control access is down to the user.
Can be bad as passwords can be forgotten or easily hacked as people make easy to guess passwords
What is Data-Oriented Access control?
We try to control which processes can do which operations to which files and programs. We define an object to be anything which access is being controlled.
How does Windows do Data oriented access control?
Each process has an access token and each object has a security descriptor. When a process tries to perform an operation on an object, Windows uses the process’s Access token to check the security descriptor to ensure that this operation is allowed.
What is an Access Token store?
-Security ID (SID)
A unique number which identifies the user uniquely across all machines on the network
-Group SIDS
A list of the groups to which the user belongs
-Information on privileges, owner
What does a Security Descriptor store?
What does DACL do?
Discretionary Access Control List
-Determines which users or groups can access an object
What does SACL do?
System Access Control List
-Specifies what kinds of object should generate audit messages
What does DACL store?
-Header
-SID or Group SID plus an Access Mask (as many as needed)
Access mask states the way in which that SID can operate on this object
How is DACL used?
When a process tries to perform an operation on an object, Windows does the following:
What are the basic PC security items?
Firewall and Malware protection. Some of this is provided by your local network and some will have to be on the workstation
What types of malware protection do you need?
What does an Integrated Package for security contain?