Page 213 - DCAP403_Operating System
P. 213

Operating System




                    Notes                Brows-  Applica-  Usually auto-  Authorized   “Finger” type   Destroy   Correlate   Change user
                                         ing   tion   mated scan-  user found on- services pro-  discarded   user identi-  password or
                                                      ning of large   line at unusual  vide informa-  media   fi cation with   use standard
                                               Network  quantities of   or off-shift   tion to any and   shift times   administra-
                                                      unprotected   hours, indicat-  all users.   When on   or increased   tor functions
                                                                                    open source
                                                      data (discarded  ing a possible   The informa-  networks   frequency of   to determine
                                                      media or online  Masquerade   tion is usually   especially,   access   access point,
                                                      “fi nger” type                                   then trace back
                                                      commands) to   Authorized   assumed safe   disable   Correlate user   to perpetrator
                                                                user attempt-
                                                                                    “fi nger” type  command
                                                                          but can give
                                                      obtain clues   ing administra- clues to pass-  services  logs with
                                                      as to how to   tor command   words (e.g.,   administra-
                                                      achieve access
                                                                functions  spouse’s name)   tor command
                                                                                            functions
                                   Spam-  Spam-  Applica-  Overloading   Repeated   Open source   Require   Monitor disk   Analyze mes-
                                   ming  ming  tion   a system with   system crashes,  networks espe- authentica-  partitions,   sage headers to
                                                      incoming mes-  eventually   cially vulner-  tion fi elds   network sock- attempt trace
                                               Network
                                                      sage or other   traced to over-  able  in message   ets, etc. for   back to perpe-
                                                      traffic to cause   full buffer or   traffi c  overfull condi- trator

                                                      system crashes  swap space            tions
                                   Tunnel-  Tunnel- Network  Any digital   Bizarre system  Tunneling   Design   Changes in   Patch or re-
                                   ing   ing          attack that   behaviors such  attacks often   security   date/time   place compro-
                                                      attempts to get  as unexpected  occur by creat-  and audit   stamps for low  mised drivers
                                                      “under” a secu- disk accesses,   ing system   capabilities   level system   to prevent
                                                      rity system by   unexplained   emergencies to  into even the  fi les or chang-  access
                                                      accessing very   device failures,  cause system   lowest level  es in sector/  Monitor sus-
                                                      low level sys-  halted security  reloading or   software,   block counts   pected access
                                                      tem functions   software, etc.  initialization  such as   for device
                                                      (e.g., device                 device driv-  drivers  points to at-
                                                                                                      tempt trace
                                                      drivers, OS                   ers, shared       back to perpe-
                                                      kernels)                      libraries, etc.
                                                                                                      trator
                                                                 Unintentional Threats
                                   Category  Threat  OSI   Defi nition  Typical Behav- Vulnerabilities Prevention Detection  Counter-
                                                   Layer              iors                              measures
                                   Malfunc- Equipment  All  Hardware   Immediate loss  Vital peripheral  Replication  Hardware  On-site
                                   tion   Malfunc-       operates in   of data due   equipment is   of entire   diagnostic  replication
                                          tion           abnormal,   to abnormal   often more   system   systems  of hard-
                                                         unintended   shutdown Con- vulnerable than  including   ware com-
                                                         mode     tinuing loss of   the computers   all data   ponents
                                                                  capability until  themselves  and recent   for quick
                                                                  equipment is         transac-        recovery
                                                                  repaired             tions
                                          Software   Appli-  Software   Immediate loss  Software devel- Compre-  Software   Backup
                                          Malfunc-  cation  behavior is in  of data due   oped using ad   hensive   diagnostic  software
                                          tion           confl ict with  to abnormal   hoc rather than  testing   tools  and robust
                                                         intended   end Repeated   defi ned formal  proce-  operating
                                                         behavior  system failure   processes  dures and   systems
                                                                  when re-fed          software        facilitate
                                                                  “faulty” data        designed        quick re-
                                                                                       for graceful    covery
                                                                                       degrada-
                                                                                       tion
                                   Human   Trap Door  Appli-  System   Unauthorized   Software devel- Enforce   Audit   Close Trap
                                   Error          cation  access for   system access   oped outside   defi ned de- trails of   Door or
                                          (Back door)
                                                         developers   enables view-  defi ned organi- velopment  system   monitor
                                                         inadvertently  ing, alteration   zational policies  policies   usage,   ongoing
                                                         left avail-  or destruction   and formal   Limit net-  especially  access to
                                                         able after   of data or soft-  methods  work and   user iden- trace back
                                                         software   ware               physical   tifi cation   to perpetra-
                                                         delivery                               logs   tor
                                                                                       access
                                          User/   All    Inadvertent   Incorrect data   Poor user docu- Enforce-  Audit   Backup
                                          Operator       alteration,   entered into   mentation or   ment of   trails of   copies of
                                          Error          manipula-  system or in-  training  training   system   software
                                                         tion or   correct behav-      policies   transac-  and data
                                                         destruction   ior of system   and sepa-  tions  On-site
                                                         of programs,                  ration of       replication
                                                         data fi les or                 program-        of hard-
                                                         hardware                      mer/opera-      ware
                                                                                       tor duties


          206                              LOVELY PROFESSIONAL UNIVERSITY
   208   209   210   211   212   213   214   215   216   217   218