4773251
4773251
Contents
Storage
System System
Device RAID
Security Protection
Management
Storage Device Management
➢Low-level formatting, or physical formatting — Dividing a disk into sectors that the disk
controller can read and write
➢Each sector can hold header information, plus data, plus error correction code (ECC)
➢Usually 512 bytes of data but can be selectable
➢To use a disk to hold files, the operating system still needs to record its own data structures on the
disk
➢Partition the disk into one or more groups of cylinders, each treated as a logical disk
➢Volume creation & management
➢Logical formatting or “making a file system”
➢To increase efficiency most file systems group blocks into clusters
➢Disk I/O done in blocks
➢File I/O done in clusters
Storage Device Management Cont..
➢Root partition contains the OS, other partitions can hold other Oses, other file systems, or be raw
➢Mounted at boot time
➢Other partitions can mount automatically or manually
➢Boot block can point to boot volume or boot loader set of blocks that contain enough code to know
how to load the kernel from the file system
➢Or a boot management program for multi-os booting
Storage Device Management Cont..
➢Raw disk access for apps that want to do their own block management, keep OS out of the way
(databases for example)
➢Boot block initializes system
➢The bootstrap is stored in ROM, firmware
➢Bootstrap loader program stored in boot blocks of boot partition
➢Methods such as sector sparing used to handle bad blocks
➢Use APIs because of latency and failure scenarios (NAS protocols wouldn’t work well)
RAID Structure
➢RAID – redundant array of inexpensive disks
➢multiple disk drives provides reliability via redundancy
➢Increases the mean time to failure
➢Mean time to repair – exposure time when another failure could cause data loss
➢Mean time to data loss based on above factors
➢If mirrored disks fail independently, consider disk with 1300,000 mean time to failure and 10 hour
mean time to repair
➢Mean time to data loss is 100, 0002 / (2 ∗ 10) = 500 ∗ 106 hours, or 57,000 years!
➢Frequently combined with NVRAM to improve write performance
➢Several improvements in disk-use techniques involve the use of multiple disks working
cooperatively
RAID Levels
These are the following RAID levels:
•RAID 0 – striping
•RAID 1 – mirroring
•RAID 5 – striping with parity
•RAID 6 – striping with double parity
•RAID 10 – combining mirroring and striping
➢Breach of integrity
➢Unauthorized modification of data
➢Breach of availability
➢Unauthorized destruction of data
➢Theft of service
➢Unauthorized use of resources
➢Replay attack
➢As is or with message modification
➢Man-in-the-middle attack
➢Intruder sits in data flow, masquerading as sender to receiver and vice versa
➢Session hijacking
➢Intercept an already-established session to bypass authentication
➢Privilege escalation
➢Common attack type with access beyond what a user or resource is supposed to have
Standard Security Attacks
Security Measure Levels
➢Impossible to have absolute security, but make cost to perpetrator sufficiently high to deter most
intruders
➢Security must occur at four levels to be effective:
➢Physical
➢Data centers, servers, connected terminals
➢Application
➢Benign or malicious apps can cause security problems
➢Operating System
➢Protection mechanisms, debugging
➢Network
➢Intercepted communications, interruption, DOS
➢Security is as weak as the weakest link in the chain
➢Humans a risk too via phishing and social-engineering attacks
➢But can too much security be a problem?
Program Threats
➢Many variations, many names
➢Trojan Horse
➢Code segment that misuses its environment
➢Exploits mechanisms for allowing programs written by users to be executed by
other users
➢Spyware, pop-up browser windows, covert channels
➢Up to 80% of spam delivered by spyware-infected systems
➢Trap Door
➢Specific user identifier or password that circumvents normal security procedures
➢Could be included in a compiler
➢How to detect them?
Program Threats Cont..
➢Malware - Software designed to exploit, disable, or damage computer
➢Trojan Horse – Program that acts in a clandestine manner
➢Spyware – Program frequently installed with legitimate software to display adds, capture user data
➢Ransomware – locks up data via encryption, demanding payment to unlock it
➢Others include trap doors, logic boms
➢All try to violate the Principle of Least Privilege
➢Goal frequently is to leave behind Remote Access Tool (RAT) for repeated access
Program Threats Cont..
➢Viruses
➢Code fragment embedded in legitimate program
➢Self-replicating, designed to infect other computers
➢Very specific to CPU architecture, operating system, applications
➢Usually borne via email or as a macro
➢Visual Basic Macro to reformat hard drive
Sub AutoOpen()
Dim oFS
Set oFS = CreateObject(’’Scripting.FileSystemObject’’)
vs = Shell(’’c:command.com /k format c:’’,vbHide)
End Sub
Program Threats Cont..
➢Attacks still common, still occurring
➢Attacks moved over time from science experiments to tools of organized crime
➢Targeting specific companies
➢Creating botnets to use as tool for spam and DDOS delivery
➢Keystroke logger to grab passwords, credit card numbers
➢Why is Windows the target for most attacks?
➢Most common
➢Everyone is an administrator
➢Licensing required?
➢Monoculture considered harmful
Four-layered Model of Security
System and Network Threats
➢Some systems “open” rather than secure by default
➢Reduce attack surface
➢But harder to use, more knowledge needed to administer
➢Network threats harder to detect, prevent
➢Protection systems weaker
➢More difficult to have a shared secret on which to base access
➢No physical limits once system attached to internet
➢Or on network with system attached to internet
➢Even determining location of connecting system difficult
➢IP address is only knowledge
System and Network Threats Cont..
➢Worms – use spawn mechanism; standalone program
➢Internet worm
➢Exploited UNIX networking features (remote access) and bugs in finger and sendmail
programs
➢Exploited trust-relationship mechanism used by rsh to access friendly systems
without use of password
➢Grappling hook program uploaded main worm program
➢99 lines of C code
➢Hooked system then uploaded main code, tried to attack connected systems
➢Also tried to break into other users accounts on local system via password guessing
➢If target system already infected, abort, except for every 7th time
Worm Vs Virus Vs Trojan Horses
➢Internal to a given computer, source and destination of messages can be known and protected
➢OS creates, manages, protects process IDs, communication ports
➢Source and destination of messages on network cannot be trusted without cryptography
➢Local network – IP address?
➢Consider unauthorized host added
➢WAN / Internet – how to establish authenticity
➢Not via IP address
Cryptography
Means to constrain potential senders (sources) and / or receivers (destinations) of messages
◦ Complementary to encryption
◦ Also can prove message unmodified
Algorithm components
◦ A set K of keys
◦ A set M of messages
◦ A set A of authenticators
◦ A function S : K → (M→ A)
◦ That is, for each k K, Sk is a function for generating authenticators from
messages
◦ Both S and Sk for any k should be efficiently computable functions
◦ A function V : K → (M × A→ {true, false}). That is, for each k K, Vk is a
function for verifying authenticators on messages
◦ Both V and Vk for any k should be efficiently computable functions
Authentication – Hash Functions
Basis of authentication:
Creates small, fixed-size block of data message digest (hash value) from m
Hash Function H must be collision resistant on m
◦ Must be infeasible to find an m’ ≠ m such that H(m) = H(m’)
If H(m) = H(m’), then m = m’
◦ The message has not been modified
Common message-digest functions include MD5, which produces a 128-bit hash, and SHA-1, which
outputs a 160-bit hash
Not useful as authenticators
◦ For example H(m) can be sent with a message
◦ But if H is known someone could modify m to m’ and recompute H(m’) and modification not
detected
◦ So must authenticate H(m)
Authentication - MAC
Symmetric encryption used in message-authentication code (MAC) authentication algorithm