Computer Security
Geetika Sharma
Fall 2008
Outline
Fundamentals
of Computer Security
Security Threats and Protection Methods
Security Models and Mechanisms
Security Issues in Distributed systems
Latest Techniques
Fundamentals of Computer
Security[1]
Computer Systems
Objects
Security Threats[1]
Interruption (availability)
Loss
Interception
Related
to secrecy
Client Side
Fool it
Server Side
Network
Security Mechanisms[1]
Authentication
Verification
Authorization
Extending permission
Fault Tolerance
Sustaining faults
Encryption
Prevents exposure of information and maintains
privacy
Auditing
Passive form of protection
Security Models[1]
Discretionary
Mandatory
and Transparency
Approaches
Client/Server Security
A client initiates an access to an object through the
kernel
Kernel authenticates the client and then invokes the
object server
Implemented via Interprocess Communication at
transport layer
Supported by secure host-to-host communications at the
network layer and node to node communication at the
link layer
Secure distributed system consists of communicating
security servers using trusted gateway.
response
Other OS Servers
response
Authentication
Server
Authorization
Server
Other Security
Servers
request
Latest Techniques
On-line User
Agent
On-line User
Agent
Free
BSD
Dbase
Off-line User
Agent
Win
2000
On-line User
Agent
Controller
Agent
On-line User
Agent
Linux
References
1. Randy Chow, Theodore Jognson. Distributed Operating Systems and
Algorithms, Addison-Wesley 1997
2. Agent Approach for Providing Security in Distributed Systems;
TCSET'2006, February 28-March 4, 2006, Lviv-Slavsko, Ukraine
3. GHIDS:Defending Computational Grids Against Misusing of Shared
Resources, Feng et all, IEEE 2006
4. www.cse.sc.edu/~farkas/csce522-2003/lectures/csce522lect22.ppt (2003)
Thanks!