1、Applied Operating System Concepts,Chap 19: Security安全,Applied Operating System Concepts,Content (内容),The Security Problem(安全问题)Authentication(授权)Program Threats(来自程序的威胁)System Threats(来自系统的威胁)Threat Monitoring(威胁的监控)Encryption(加密)Computer-Security Classifications(计算机安全的分级 )Summary(总结),Applied Operat
2、ing System Concepts,The Security Problem(安全问题),Security must consider external environment of the system, and protect it from:(安全必须考虑系统的外环境,以下方面防护:)unauthorized access.(未授权访问)malicious modification or destruction(恶意的修改和破坏)accidental introduction of inconsistency.(意外的引入和不一致)Easier to protect against
3、accidental than malicious misuse.(防止意外的误用比防止恶意的误用更加容易),Applied Operating System Concepts,Authentication(授权),User identity most often established through passwords, can be considered a special case of either keys or capabilities.(用户身份通常使用密码确立,可以认为密码就是某种权限或者钥匙)Passwords must be kept secret.(密码必须保持秘密的状
4、态)Frequent change of passwords.(经常更换密码)Use of “non-guessable” passwords.(使用难猜的密码)Log all invalid access attempts.(记录所有非法访问企图),Applied Operating System Concepts,Program Threats(程序的威胁),Trojan Horse(特洛伊木马)Code segment that misuses its environment.(代码段滥用环境)Exploits mechanisms for allowing programs writt
5、en by users to be executed by other users.(利用机制使得某个用户写的程序可以被其他用户运行)Trap Door(后门)Specific user identifier or password that circumvents normal security procedures.(特殊的用户标识符或者密码可以绕过通常的安全检查)Could be included in a compiler.(有可能包含在编译器中),Applied Operating System Concepts,System Threats(系统的威胁),Worms use spa
6、wn mechanism; standalone program(蠕虫:使用大量复制机制;独立的程序)Internet worm(因特网蠕虫)Exploited UNIX networking features (remote access) and bugs in finger and sendmail programs.(使用UNIX网络特性以及finger、sendmail等程序的漏洞)Grappling hook program uploaded main worm program.(挂钩程序启动蠕虫程序的主体)Viruses fragment of code embedded in
7、a legitimate program.(病毒:嵌入到合法程序中的代码片断)Mainly effect microcomputer systems.(主要影响微机系统)Downloading viral programs from public bulletin boards or exchanging floppy disks containing an infection.(从网络下载带毒程序或者使用受到感染的软盘)Safe computing.(安全计算),Applied Operating System Concepts,The Morris Internet Worm(Morris
8、因特网蠕虫),Applied Operating System Concepts,Threat Monitoring(威胁监控),Check for suspicious patterns of activity i.e., several incorrect password attempts may signal password guessing.(检查可疑的行动模式:例如,多次错误的密码尝试可能表示有人在猜密码)Audit log records the time, user, and type of all accesses to an object; useful for reco
9、very from a violation and developing better security measures.(审计日志:记录所有对象访问的时间、用户、以及类型;对于受损后的恢复以及开发更好的安全措施有用)Scan the system periodically for security holes; done when the computer is relatively unused.(定期扫描系统安全漏洞;系统不用的时候关闭),Applied Operating System Concepts,Threat Monitoring (Cont.)(威胁监控 续),Check
10、for:(检查)Short or easy-to-guess passwords(过短的或易猜的密码)Unauthorized set-uid programs(未授权的set-uid程序)Unauthorized programs in system directories(系统目录中的未授权程序)Unexpected long-running processes(程序的意外超常时间运行)Improper directory protections(不恰当的目录保护)Improper protections on system data files(不恰当的系统数据文件保护)Dangerou
11、s entries in the program search path (Trojan horse)(危险的程序搜索路径入口)Changes to system programs: monitor checksum values(系统程序的改变:监控器检查程序代码的校验和),Applied Operating System Concepts,Network Security Through Domain Separation Via Firewall网络安全通过使用防火墙分离的域实现,Applied Operating System Concepts,Encryption(加密),Encry
12、pt clear text into cipher text.(加密使得明文变成密文)Properties of good encryption technique:(优秀加密技术的特征)Relatively simple for authorized users to incrypt and decrypt data. (对于授权用户,加密和解密都相对的简单)Encryption scheme depends not on the secrecy of the algorithm but on a parameter of the algorithm called the encryptio
13、n key.(加密模式依赖于算法的密钥参数,而不是算法的保密)Extremely difficult for an intruder to determine the encryption key.(入侵者确定密钥极为困难)Data Encryption Standard substitutes characters and rearranges their order on the basis of an encryption key provided to authorized users via a secure mechanism. Scheme only as secure as t
14、he mechanism. (数据加密标准使用通过安全机制提供给授权用户的密钥代替了打乱次序文字串。模式和机制一样安全),Applied Operating System Concepts,Encryption (Cont.)(加密 续),Public-key encryption based on each user having two keys:(公钥加密,每个用户有两个密钥)public key published key used to encrypt data.(公钥:用于加密的公共密钥)private key key known only to individual user u
15、sed to decrypt data.(私钥:用于解密的密钥,只有授权的用户个人知道)Must be an encryption scheme that can be made public without making it easy to figure out the decryption scheme.(加密模式必须可以公开,并且不会因此容易计算出来)Efficient algorithm for testing whether or not a number is prime.(高效的算法测试一个数是否为素数)No efficient algorithm is know for fi
16、nding the prime factors of a number.(大数的质因数分解目前只有复杂度很高的算法),Applied Operating System Concepts,Computer-Security Classifications(计算机安全的分级 ),Four divisions of security : A,B,C,and D. The lowest-level classifications is division D,or minimal protection.(安全有四级A,B,C,D,其中D的等级最低,或者保护性最小。)Division D comprise
17、s only one class,failed to meet the requirements of any one of the other security classes.MS-DOS and Windows 3.1 are in division D.(D仅是一个级别,不满足其他安全级别的需要。MS-DOS和Win3.1是D级别),Applied Operating System Concepts,Computer-Security Classifications(Cont.)(计算机安全的分级 续 ),Division C has two levels:C1 and C2.(C有两
18、个级别C1和C2)A C1 class system incorporates some form of controls the allow users to protect private information and to keep other users from accidentally reading or destroying their data. Most version of UNIX are C1 class.(C1级别系统包含一些形式的控制,允许用户保护他们的私人信息,防止其他用户意外地读或破坏他们的数据。大部分版本的UNIX都是C1级别)A C2 class sys
19、tem adds to the requirements of a C1 system via an individual-level access control.Some special,secure versions of UNIX have been certified at the C2 level.(C2级别系统通过个体级别地访问控制,在C1系统上增加了一些需求。一些特殊的安全版本的UNIX被授予C2级别),Applied Operating System Concepts,Computer-Security Classifications(Cont.)(计算机安全的分级 续 ),
20、Division B mandatory-protection systems have all the properties of a class C2 system, plus they attach sensitivity labels to each object. Division B has three levels:B1,B2 and B2.(B类是一个强制保护性系统,具有所有C2类系统的属性,另外为每个对象都贴上敏感的标签。B有三个级别B1,B2和B3)Division A is the highest-level classification.(A 类是最高等级的分类。),A
21、pplied Operating System Concepts,Java Security Model(Java的安全模型),Applied Operating System Concepts,Summary(总结),In this chapter, we examine the ways in which information may be misused or intentionally made inconsistent. (本章我们分析了信息可能被误用或故意使之不一致的方法)We then present mechanisms to guard against this occurrence.(然后展示了预防上述事件发生的机制。),