🔒Cybersecurity and Cryptography Unit 5 – OS Security and Access Control
Operating system security is crucial for protecting systems from unauthorized access and exploitation. It encompasses authentication, authorization, and access control to regulate who can use system resources and how. These measures form the foundation of a secure computing environment.
Access control models like DAC, MAC, and RBAC define rules for granting or restricting access. Authentication methods verify user identities, while authorization techniques determine permissions. File system security, privilege management, and security policies further enhance OS protection against threats and vulnerabilities.
Provides a high level of assurance but requires specialized hardware and can raise privacy concerns
Certificate-based authentication uses digital certificates to prove the identity of users or devices
Certificates are issued by trusted certificate authorities (CAs) and contain information about the owner's identity
Single sign-on (SSO) allows users to authenticate once and access multiple systems or applications without re-entering credentials
Reduces the burden of managing multiple passwords and improves user experience
Risk-based authentication dynamically adjusts authentication requirements based on the assessed risk level of a user or transaction
May require additional verification steps for high-risk activities (large financial transactions, access from unfamiliar locations)
Authorization Techniques
Authorization determines the permissions and privileges granted to authenticated users or processes
Access control lists (ACLs) specify the permissions associated with an object (file, directory) for different users or groups
Each entry in an ACL defines the access rights (read, write, execute) for a specific user or group
Role-based authorization assigns permissions to roles rather than individual users
Users acquire permissions based on the roles they are assigned to
Simplifies permission management and ensures consistent access control across an organization
Rule-based authorization uses predefined rules to determine access rights based on user attributes, object properties, or contextual factors
Rules can be expressed as if-then statements or using a policy language
Attribute-based authorization evaluates user attributes, object attributes, and environmental conditions to make access decisions
Attributes can include user roles, security clearance, time of day, or location
Capability-based authorization associates permissions directly with objects rather than users
Users possess capabilities (tokens) that grant them specific access rights to objects
Delegated authorization allows users to grant a portion of their permissions to other users or processes
Useful for temporary access or when users need to share resources with collaborators
File System Security
File system security controls access to files and directories and protects against unauthorized modification or disclosure
File permissions determine the actions users can perform on files and directories (read, write, execute)
Permissions can be assigned to individual users, groups, or roles
Access control lists (ACLs) provide granular control over file access by specifying permissions for each user or group
ACLs can be used to grant or deny access to specific files or directories
File encryption protects the confidentiality of sensitive data by encoding it with a secret key
Encrypted files are unreadable without the corresponding decryption key
Secure deletion techniques ensure that deleted files cannot be recovered by unauthorized parties
Methods include overwriting file data, using secure deletion tools, or encrypting files before deletion
File integrity monitoring detects unauthorized changes to files by comparing their current state to a known baseline
Helps identify malicious modifications, accidental changes, or file corruption
Auditing and logging track file access and modification activities for security analysis and incident response
Log entries include details such as user identity, timestamp, and the action performed (read, write, delete)
Regular backups protect against data loss due to hardware failure, file corruption, or ransomware attacks
Backups should be stored securely and tested regularly to ensure their reliability
Privilege Management
Privilege management involves controlling and monitoring the privileges assigned to users and processes
Principle of least privilege (PoLP) ensures that users and processes have only the minimum privileges necessary to perform their tasks
Reduces the potential impact of security breaches and limits the scope of unauthorized actions
Privilege separation divides a system or application into components with different levels of privilege
Critical components run with higher privileges and are isolated from less trusted components
Privilege escalation occurs when a user or process gains higher privileges than initially assigned
Can be legitimate (sudo command) or malicious (exploiting vulnerabilities to gain unauthorized privileges)
Privilege bracketing grants elevated privileges to a process for a limited time or scope
Privileges are dropped when no longer needed, reducing the window of vulnerability
Privilege auditing monitors and logs the use of privileged accounts and actions
Helps detect misuse, abuse, or unauthorized privilege escalation attempts
Regular privilege review ensures that user privileges align with their current roles and responsibilities
Unused or excessive privileges should be revoked to maintain the principle of least privilege
Security Policies and Best Practices
Security policies establish the rules, guidelines, and procedures for maintaining the security of an operating system
Access control policies define who can access system resources, under what conditions, and with what permissions
Policies should be based on the principle of least privilege and enforce strong authentication and authorization mechanisms
Password policies specify requirements for password strength, complexity, expiration, and storage
Policies may include minimum length, mandatory use of special characters, and regular password changes
Data classification policies categorize data based on its sensitivity and define appropriate handling and protection measures
Classifications can include public, internal, confidential, or restricted data
Incident response policies outline the procedures for detecting, reporting, and responding to security incidents
Policies define roles and responsibilities, communication channels, and escalation procedures
Network security policies govern the secure configuration and use of network resources and services
Policies may cover firewall rules, VPN access, wireless security, and remote access protocols
Backup and disaster recovery policies ensure the regular backup of critical data and define procedures for recovering from disasters or system failures