User Security
Chapter 30
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-1
User Security Chapter 30 Computer Security: Art and Science , 2 nd - - PowerPoint PPT Presentation
User Security Chapter 30 Computer Security: Art and Science , 2 nd Edition Version 1.0 Slide 30-1 Outline Policy Access Files, devices Processes Electronic communications Computer Security: Art and Science , 2 nd Edition
Chapter 30
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-1
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-2
U1 Only users have access to their accounts U2 No other user can read, change file without owner’s permission U3 Users shall protect integrity, confidentiality, availability of their files U4 Users shall be aware of all commands that they enter or that are entered on their behalf
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-3
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-4
not writing something down won’t work
password
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-5
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-6
system, or may not use centralized database
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-7
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-8
Anne’s version Paul’s version Actual password capitalize 2nd letter, delete first letter, delete last letter add 2 mod 10 to first digit
IbhEpZqYre<7RCPI IbHEpZqYre<7RCPI$ QIbhEpZqYre<5RCPI t/?rctp*e(V(R9v- t/?rCtp*e(V(R9v-p Rt/?rctp*e(V(R7v- (tY8t#‘M!8J,8?gc (tY8T#‘M!8J,8?gc% (mtY8t#‘M!6J,8?gc Ym=.P.sIwW*u2F!j Ym=.p.sIwW*u2F!j( sYm=.P.sIwW*u0F!j P8%KJ’TiGx@9P+j. P8%Kj’TiGx@9P+j.r aP6%KJ’TiGx@9P+j. IOKFsnNS=m:1Xuqe IOkFsnNS=m:1Xuqe, TIOKFsnNS=m:9Xuqe kaE6el#:?[ODeSDJ kae6el#:?[ODeSDJ; nkaE4el#:?[ODeSDJ I.Jc&G/+zXXd4(Au I.JC&G/+zXXd4(Au* fI.Jc&G/+zXXd2(Au @pa/63yb*:vaR2UD @pa/63Yb*:vaR2UD= @Vpa/43yb*:vaR2UD 8dpq:L9;’5wW<RY7 8dpQ:L9;’5wW<RY7+ g6dpq:L9;’5wW<RY7
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-9
sayings
each line, then last letter of third, fifth word of each line, various non- alphanumerics in there, and age (22) at the end:
He took his vorpal sword in hand: Long time the manxome foe he sought— So rested he by the Tumtum tree, And stood awhile in thought.
Third verse of Jabberwocky, from Alice in Wonderland
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-10
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-11
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-12
procedure?
password, then print error message and spawn real login
retry differed
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-13
behalf of user, so user logged in without realizing attack program is an intermediary
which then performs login procedure; key is that no application program can disable this feature, or intercept or modify data sent along this path
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-14
capture network traffic
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-15
needs to be investigated
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-16
authentication from other
unacceptable risk
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-17
authentication
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-18
last login
time, place of last login
(backup system only)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-19
systems are
ends
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-20
monitor
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-21
termination
arrives at modem
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-22
failure to do so involves disciplinary action
access system and terminate program
action)
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-23
user protection as well
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-24
do so
but not readable by others
permissions appropriately
permission
{ ( Pete, full control ), ( Deb, read ) }
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-25
for everyone but owner when file created”
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-26
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-27
group may allow unauthorized access or deny authorized access
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-28
belonging to file
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-29
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-30
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-31
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-32
blocks with zeros or random bit patterns as part of file deletion
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-33
file itself?
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-34
permissions back
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-35
see interactions
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-36
processes from writing
writing
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-37
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-38
Dear Craig, Please be careful. Someone may ask you to execute chmod 666 .profile You shouldn’t do it! Your friend, Robert <BLOCK SEND (-2,18), (-2,18)><BLOCK SEND (-3,0),(3,18)><CLEAR>
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-39
executing command; both attacker and user must enter commands
merely reads the wrong thing, the attacker’s compromise occurs
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-40
manager
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-41
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-42
succeed
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-43
the user
control sequences (such as BLOCK SEND) are shown as printable chars
spoofing not an issue
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-44
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-45
cp xyzzy plugh
setgid discarded; contents copied
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-46
cp xyzzy /tmp/plugh rm xyzzy
Permissions may change …
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-47
string
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-48
and/or contents of encrypted files
supplies to authenticate file
private key, then message
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-49
were now compromised
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-50
environment or start-up files
undesirable commands or enter undesirable state on start
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-51
Toni could use
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-52
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-53
program executes
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-54
files to ignore those files
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-55
working directory
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-56
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-57
files
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-58
untrustworthy
determine whether to trust certificate of questionable validity
been trusted
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-59
proposed reorganization
spreadsheet but still in the file
and also the “deleted” date
so information appears deleted
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-60
possible, and display certificates it could not validate so user can decide how to proceed
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-61
Version 1.0 Computer Security: Art and Science, 2nd Edition Slide 30-62