Page 306 - DCAP103_Principle of operating system
P. 306

Unit 9: System Security



                 are collected, records linking a user to his or her IP address should be kept long enough   Notes
                 for misuse to be reported and investigated. Staff and students of the organization should
                 have their own local accounts. Visitors may also have local accounts, or authorized staff
                 may be enabled to set up daily accounts for their guests. Visitors from other organizations
                 may be authenticated by their home organization if both organizations are members of
                 JANET Roaming or another partner in the teReNA (trans-European Research and education
                 Network Association) eduroam federation.
            Even if individual identities are not checked, access to the JANET network must still be limited
            to those who are known to the organization. Knowingly providing network access to strangers
            is likely to be a breach of JANET policies and to be considered irresponsible by other users of the
            network. Access may be limited by physical barriers, although this does not work for wireless
            networks, or by providing temporary access codes to guests such as conference delegates.
            Organizations may wish to arrange their networks so that these visitors do not accidentally
            obtain access to internal resources controlled or licensed by IP address.

            Organizations that provide access to networks, and users who benefit from that access, should
            regard it as normal to require an individual identity. Systems for establishing electronic identity
            are becoming easier to use and manage. In a few situations there may be a justification for not
            checking and recording identity but this should only be done after a rational assessment of the
            risks and benefits.




                    Explain how to change the user authentication password in the computer.

            9.5.1 Implementation of Defenses

            Several layers of security can be built on the top of the database. This article primarily focuses
            on use of encryption and stored procedures at the database level. While the use of encryption
            techniques prevents eavesdropping and interception of the traffic at the network level, the use
            of stored procedures protects against attacks involving tampering of data sent to the server.
            9.5.1.1 First Layer of Defense (Encryption)
            When  encryption  is  used,  the  traffic  between  the  database  driver  and  the  database  server
            is encrypted. This makes it difficult for the attackers to intercept the data in transit, thereby
            preventing successful execution of several attacks such as injection based attacks on two-tier
            thick client applications.
            The two most used encryption techniques are Internet Protocol Security (IPSEC) and Secure
            Socket Layer (SSL). Many of the latest versions of the databases support both types of encryption
            techniques. While IPSEC encryption works on the network layer, SSL encryption works at the
            transport  layer  leading  to  an  easier  implementation.  Currently,  SSL  encryption  is  the  more
            popular one due to its ease of implementation. Let us see a few examples of using SSL encryption
            on popular databases.
            9.5.1.2 The SSL Handshake

            When a client (database driver) initiates a connection to the server over SSL, a SSL handshake
            occurs between the client and server. During this handshake, both the client and the server agree
            upon a specific cipher suite that specifies the encryption algorithm to be used. Then the server
            authenticates itself to the client by providing its certificate signed by a trusted CA. Later, both
            the client and server generate a session key and exchange it using a public key cryptography.
            Any further communication happens in an encrypted form.


                                             LOVELY PROFESSIONAL UNIVERSITY                                   299
   301   302   303   304   305   306   307   308   309   310   311