SlideShare a Scribd company logo
1 of 24
111
Trusted Systems and Trojan Horse
Done by : Hany Nasser
Supervised by : PhD Nabil Hamdy
22
Trusted Systems
๏ฎ Systems used to enhance the ability to
defend against intruders and malicious
programs.
๏ฎ based on levels of security .
33
Multilevel Security
๏ฎ When multiple categories or levels of data are
defined, the requirement is referred to as
multilevel security.
๏ฎ Typically use Mandatory Access Control.
๏ฎ Primary Security Goal: Confidentiality (ensures
that information do not flow to those not cleared
for that level).
4
Security Goal of MLS
๏ฎ There are security classifications or security
levels
๏ฎ Subjects have security clearances
๏ฎ Objects have security classifications
๏ฎ Example of security levels
๏ฎ Top Secret
๏ฎ Secret
๏ฎ Confidential
๏ฎ Unclassified
๏ฎ In this case Top Secret > Secret > Confidential
> Unclassified
555
Data Access Control
๏ฎ Through the user access control
procedure (log on), a user can be
identified to the system.
๏ฎ Associated with each user, there can be
a profile that specifies permissible
operations and file accesses.
๏ฎ The operating system can enforce rules
based on the user profile.
666
Data Access Control
๏ฎ General models of access control:
๏ฎ Access matrix
๏ฎ Access control list
๏ฎ Capability list
777
Data Access Control
๏ฎ Access Matrix: Basic elements of the model
๏ฎ Subject
๏ฎ Object
๏ฎ Access right
888
Data Access Control
๏ฎ Access Matrix
999
Data Access Control
๏ฎ Access Control List: Decomposition of
the matrix by columns
101010
Data Access Control
๏ฎ Access Control List
๏ฎ For each object, An access control list lists
users and their permitted access right.
๏ฎ The list may contain a default or public
entry.
111111
Data Access Control
๏ฎ Capability list: Decomposition of the
matrix by rows
121212
Data Access Control
๏ฎ Capability list
๏ฎ A capability ticket specifies authorized
objects and operations for a user.
๏ฎ Each user have a number of tickets.
๏ฎ Capabilities are not forgeable.
131313
The Concept of
Trusted Systems
๏ฎ Multilevel security
๏ฎ Definition of multiple categories or levels of data
๏ฎ A multilevel secure system must enforce:
๏ฎ No read up
๏ฎ No write down
141414
The Concept of
Reference Monitor
151515
The Concept of
Reference monitor
๏ฎ Reference Monitor
๏ฎ Controlling element in the hardware and
operating system of a computer that
regulates the access of subjects to objects
on basis of security parameters
๏ฎ The monitor has access to a file (security
kernel database)
๏ฎ The monitor enforces the security rules (no
read up, no write down)
161616
The Concept of
Reference Monitor
๏ฎ Properties of the Reference Monitor
๏ฎ Complete mediation
๏ฎ Isolation
๏ฎ Verifiability
1717
Trojan Horse
๏ฎ It is a type of malware (malicious
software) designed to provide
unauthorized, remote access to a userโ€™s
computer.
๏ฎ Trojan horses do not have the ability to
replicate themselves like viruses.
๏ฎ With the help of Trojan, an user can get
access to the Trojan horse infected
computer and would be able to access the
data.
1818
Types of Trojans
๏ฎ Command Shell Trojan
๏ฎ Email Trojan
๏ฎ Document Trojan
๏ฎ FTP Trojan
191919
Trojan Horse Defense
2020
Indications of Trojan Attack
๏ฎ Browser redirects to unknown pages.
๏ฎ Anti virus is disabled.
๏ฎ Strange pop ups or chat messages appear
on the system.
๏ฎ The computer shuts down automatically.
๏ฎ Ctl+Alt+Del stops working.
๏ฎ Printer prints documents automatically.
2121
Examples of Trojan
๏ฎ Net bus
๏ฎ Sub seven
๏ฎ Y3K remote administration tool
๏ฎ Back Orifice
๏ฎ Beast
๏ฎ Zeus
๏ฎ The Black hole Exploit kit
๏ฎ Flashback Trojan
2222
How to avoid being infected ?
๏ฎ Do not surf or download anything from
stranger website.
๏ฎ Do not open the unexpected attachments
on emails.
๏ฎ We need an antivirus to protect our
computer from being infected.
2323
References
๏ฎ Cryptography And Network Security, 4th
Edition by William Stallings.
๏ฎ Computer Security, 2nd edition by Dieter
Gollman.
๏ฎ Specifications of multi-level security
research by Daryl McCullough.
24
Thank you

More Related Content

What's hot

Steganography
Steganography Steganography
Steganography
Uttam Jain
ย 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
ย 

What's hot (20)

T9. Trust and reputation in multi-agent systems
T9. Trust and reputation in multi-agent systemsT9. Trust and reputation in multi-agent systems
T9. Trust and reputation in multi-agent systems
ย 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
ย 
Code optimization in compiler design
Code optimization in compiler designCode optimization in compiler design
Code optimization in compiler design
ย 
S/MIME
S/MIMES/MIME
S/MIME
ย 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
ย 
MACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block CiphersMACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block Ciphers
ย 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
ย 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
ย 
RECURSIVE DESCENT PARSING
RECURSIVE DESCENT PARSINGRECURSIVE DESCENT PARSING
RECURSIVE DESCENT PARSING
ย 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
ย 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
ย 
Steganography
Steganography Steganography
Steganography
ย 
Intruders
IntrudersIntruders
Intruders
ย 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
ย 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
ย 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
ย 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
ย 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
ย 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
ย 
IP Security
IP SecurityIP Security
IP Security
ย 

Viewers also liked

E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
koolkampus
ย 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
Mohd Arif
ย 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
Mohd Arif
ย 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
ahmad abdelhafeez
ย 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
SANTANU KUMAR DAS
ย 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
Yosef Gamble
ย 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
ย 
Network management
Network managementNetwork management
Network management
Mohd Arif
ย 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Nikhil Mashruwala
ย 

Viewers also liked (20)

Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
ย 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
ย 
KNIME tutorial
KNIME tutorialKNIME tutorial
KNIME tutorial
ย 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
ย 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
ย 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
ย 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
ย 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
ย 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
ย 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
ย 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
ย 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
ย 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
ย 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
ย 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
ย 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
ย 
Smart card
Smart cardSmart card
Smart card
ย 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
ย 
Network management
Network managementNetwork management
Network management
ย 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
ย 

Similar to Trusted systems

23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
Umang Gupta
ย 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
ย 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
C.U
ย 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
ย 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
AsmaaLafi1
ย 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
ย 

Similar to Trusted systems (20)

Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
ย 
Unit 7
Unit 7Unit 7
Unit 7
ย 
Is4560
Is4560Is4560
Is4560
ย 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
ย 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
ย 
OSCh19
OSCh19OSCh19
OSCh19
ย 
OS_Ch19
OS_Ch19OS_Ch19
OS_Ch19
ย 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
ย 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
ย 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
ย 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
ย 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
ย 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
ย 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
ย 
Cyber security
Cyber security Cyber security
Cyber security
ย 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
ย 
Network and web security
Network and web securityNetwork and web security
Network and web security
ย 
IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
ย 

More from ahmad abdelhafeez

More from ahmad abdelhafeez (20)

Surveying cross layer protocols in ws ns
Surveying cross layer protocols in ws nsSurveying cross layer protocols in ws ns
Surveying cross layer protocols in ws ns
ย 
Service level management
Service level managementService level management
Service level management
ย 
Energy harvesting sensor nodes
Energy harvesting sensor nodes   Energy harvesting sensor nodes
Energy harvesting sensor nodes
ย 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
ย 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
ย 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
ย 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
ย 
Routing
RoutingRouting
Routing
ย 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
ย 
opnet
opnetopnet
opnet
ย 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
ย 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networks
ย 
Intrusion prevension
Intrusion prevensionIntrusion prevension
Intrusion prevension
ย 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
ย 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
ย 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
ย 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
ย 
Malewareanalysis presentation
Malewareanalysis presentationMalewareanalysis presentation
Malewareanalysis presentation
ย 
pentration testing
pentration testingpentration testing
pentration testing
ย 
Automatic left ventricle segmentation
Automatic left ventricle segmentationAutomatic left ventricle segmentation
Automatic left ventricle segmentation
ย 

Recently uploaded

Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
ย 
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
dharasingh5698
ย 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
ย 

Recently uploaded (20)

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
ย 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 

Trusted systems

  • 1. 111 Trusted Systems and Trojan Horse Done by : Hany Nasser Supervised by : PhD Nabil Hamdy
  • 2. 22 Trusted Systems ๏ฎ Systems used to enhance the ability to defend against intruders and malicious programs. ๏ฎ based on levels of security .
  • 3. 33 Multilevel Security ๏ฎ When multiple categories or levels of data are defined, the requirement is referred to as multilevel security. ๏ฎ Typically use Mandatory Access Control. ๏ฎ Primary Security Goal: Confidentiality (ensures that information do not flow to those not cleared for that level).
  • 4. 4 Security Goal of MLS ๏ฎ There are security classifications or security levels ๏ฎ Subjects have security clearances ๏ฎ Objects have security classifications ๏ฎ Example of security levels ๏ฎ Top Secret ๏ฎ Secret ๏ฎ Confidential ๏ฎ Unclassified ๏ฎ In this case Top Secret > Secret > Confidential > Unclassified
  • 5. 555 Data Access Control ๏ฎ Through the user access control procedure (log on), a user can be identified to the system. ๏ฎ Associated with each user, there can be a profile that specifies permissible operations and file accesses. ๏ฎ The operating system can enforce rules based on the user profile.
  • 6. 666 Data Access Control ๏ฎ General models of access control: ๏ฎ Access matrix ๏ฎ Access control list ๏ฎ Capability list
  • 7. 777 Data Access Control ๏ฎ Access Matrix: Basic elements of the model ๏ฎ Subject ๏ฎ Object ๏ฎ Access right
  • 9. 999 Data Access Control ๏ฎ Access Control List: Decomposition of the matrix by columns
  • 10. 101010 Data Access Control ๏ฎ Access Control List ๏ฎ For each object, An access control list lists users and their permitted access right. ๏ฎ The list may contain a default or public entry.
  • 11. 111111 Data Access Control ๏ฎ Capability list: Decomposition of the matrix by rows
  • 12. 121212 Data Access Control ๏ฎ Capability list ๏ฎ A capability ticket specifies authorized objects and operations for a user. ๏ฎ Each user have a number of tickets. ๏ฎ Capabilities are not forgeable.
  • 13. 131313 The Concept of Trusted Systems ๏ฎ Multilevel security ๏ฎ Definition of multiple categories or levels of data ๏ฎ A multilevel secure system must enforce: ๏ฎ No read up ๏ฎ No write down
  • 15. 151515 The Concept of Reference monitor ๏ฎ Reference Monitor ๏ฎ Controlling element in the hardware and operating system of a computer that regulates the access of subjects to objects on basis of security parameters ๏ฎ The monitor has access to a file (security kernel database) ๏ฎ The monitor enforces the security rules (no read up, no write down)
  • 16. 161616 The Concept of Reference Monitor ๏ฎ Properties of the Reference Monitor ๏ฎ Complete mediation ๏ฎ Isolation ๏ฎ Verifiability
  • 17. 1717 Trojan Horse ๏ฎ It is a type of malware (malicious software) designed to provide unauthorized, remote access to a userโ€™s computer. ๏ฎ Trojan horses do not have the ability to replicate themselves like viruses. ๏ฎ With the help of Trojan, an user can get access to the Trojan horse infected computer and would be able to access the data.
  • 18. 1818 Types of Trojans ๏ฎ Command Shell Trojan ๏ฎ Email Trojan ๏ฎ Document Trojan ๏ฎ FTP Trojan
  • 20. 2020 Indications of Trojan Attack ๏ฎ Browser redirects to unknown pages. ๏ฎ Anti virus is disabled. ๏ฎ Strange pop ups or chat messages appear on the system. ๏ฎ The computer shuts down automatically. ๏ฎ Ctl+Alt+Del stops working. ๏ฎ Printer prints documents automatically.
  • 21. 2121 Examples of Trojan ๏ฎ Net bus ๏ฎ Sub seven ๏ฎ Y3K remote administration tool ๏ฎ Back Orifice ๏ฎ Beast ๏ฎ Zeus ๏ฎ The Black hole Exploit kit ๏ฎ Flashback Trojan
  • 22. 2222 How to avoid being infected ? ๏ฎ Do not surf or download anything from stranger website. ๏ฎ Do not open the unexpected attachments on emails. ๏ฎ We need an antivirus to protect our computer from being infected.
  • 23. 2323 References ๏ฎ Cryptography And Network Security, 4th Edition by William Stallings. ๏ฎ Computer Security, 2nd edition by Dieter Gollman. ๏ฎ Specifications of multi-level security research by Daryl McCullough.

Editor's Notes

  1. Goal is to be able to check computer systems so that they can securely process classified information.