Lecture Protection and Security Upddated (1)
Lecture Protection and Security Upddated (1)
Objectives
Mechanism (Method)
Operating system provides access-matrix + rules
Ifensures that the matrix is only manipulated by
authorized agents and that rules are strictly enforced
Policy (Rules)
User dictates policy
Who can access what object and in what mode
Implementation of Access Matrix
There are 2 methods:
1. Access Control Lists
ACL can be created by dividing Access Matrix Column
Wise.
Separate list is maintained for each domain and each object.
It skips blank row entries in each domain.
2. Capability List
Can be created by dividing Access Matrix Row Wise.
It is list of access rights that a user / domain or a process has
for a object.
It is divided into 2 fields:
Object Descriptor
Access Rights
Access Matrix With Domains as Objects
Figure B
Operation on Access Matrix Entries
1. Copy
It allows the access right to
be copied only within the
column (for an object)
Ability to copy an access
right from one domain (row)
to another is denoted by
asterisk ( * )
A process executing in
domain D2 can copy read
operation into any entry
associated with file F2
The ability to copy rights is
denoted by an asterisk,
indicating that processes
in that domain have the
right to copy that access
within the same column
Access Matrix with Copy Rights
For example, in Figure
(a), a process executing in
domain D2 can copy the
read operation into any
entry associated with file
F2.
For example, suppose we include the control right in access(D2, D4). Then, a
process executing in domain D2 could modify domain D4, as shown.
Implementation of Access Matrix
1. GLOBAL TABLE:
Global Table consisting of a ordered set of triples <domain,
object, right set>
Before every operation on any object in any domain, the global table is
searched for triple.
If a triple is found, the operation is allowed to continue, otherwise,
an exception or error condition is raised.
Drawbacks:
Table is large. Can not be kept in the main memory. So additional I/O
is needed.
1. Trojan horse
A Trojan horse, or Trojan, is software that
appears to perform a desirable function for the
user, but steals information or harms the
system.
If a device gets infected, it sends the copies of itself onto the network
to other devices.
Include a Password
System allows authorized users who have valid user name and
password to access the system.