Chapter 15 - Computer security techniques. After studying this chapter, you should be able to: Assess the key security issues that relate to operating systems, understand the design issues for file system security, distinguish among various types of intruder behavior patterns and understand the types of intrusion techniques used to breach computer security, compare and contrast two methods of access control. | Chapter 15 Computer Security Techniques Dave Bremer Otago Polytechnic, . ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings These slides are intended to help a teacher develop a presentation. This PowerPoint covers the entire chapter and includes too many slides for a single delivery. Professors are encouraged to adapt this presentation in ways which are best suited for their students and environment. 1 Roadmap Authentication Access Control Intrusion Detection Malware Defense Dealing With Buffer Overflow Attacks Windows Vista Security This chapter introduces common measures used to counter the security threats discussed in Chapter 14 2 Authentication Basis for most type of access control and accountability Two steps Identification Verification In most computer security contexts, user authentication is the fundamental building block and the primary line of defense. User authentication is the basis for most types of access control and for . | Chapter 15 Computer Security Techniques Dave Bremer Otago Polytechnic, . ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings These slides are intended to help a teacher develop a presentation. This PowerPoint covers the entire chapter and includes too many slides for a single delivery. Professors are encouraged to adapt this presentation in ways which are best suited for their students and environment. 1 Roadmap Authentication Access Control Intrusion Detection Malware Defense Dealing With Buffer Overflow Attacks Windows Vista Security This chapter introduces common measures used to counter the security threats discussed in Chapter 14 2 Authentication Basis for most type of access control and accountability Two steps Identification Verification In most computer security contexts, user authentication is the fundamental building block and the primary line of defense. User authentication is the basis for most types of access control and for user accountability. An authentication process consists of two steps: Identification step: Presenting an identifier to the security system. Identifiers should be assigned carefully, because authenticated identities are the basis for other security services, such as access control service. Verification step: Presenting or generating authentication information that corroborates the binding between the entity and the identifier. 3 Means of Authentication Traditionally listed as three factors Something you know Password, PIN Something you have Card, RFID badge Something you are Biometrics All of these methods, properly implemented and used, can provide secure user authentication. However, each method has problems. An adversary may be able to guess or steal a password. or may be able to forge or steal a token. or a user may forget a password or lose a token. Further, there is a significant administrative overhead for managing password and token information on systems and securing such .