<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dusanrozman</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dusanrozman"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Dusanrozman"/>
	<updated>2026-05-02T07:46:04Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_2&amp;diff=20509</id>
		<title>SystemsSec 2016W Lecture 2</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_2&amp;diff=20509"/>
		<updated>2016-01-14T20:33:49Z</updated>

		<summary type="html">&lt;p&gt;Dusanrozman: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Topics &amp;amp; Readings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Operating system security&lt;br /&gt;
* Trusted computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class Notes:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Security mechanisms in a Unix system:&lt;br /&gt;
&lt;br /&gt;
* All processes have a user, group, and &amp;quot;effective user&amp;quot;. &lt;br /&gt;
* users&lt;br /&gt;
** passwords&lt;br /&gt;
** users have file permissions&lt;br /&gt;
** User input may cause vulnerabilities therefore the OS must control the input in some way.&lt;br /&gt;
&lt;br /&gt;
*Networks&lt;br /&gt;
** IP tables: allows system admin to configure tables provided by Linux kernel firewall&lt;br /&gt;
** firewall used to protect system and restrict communication from untrusted  sources.&lt;br /&gt;
** Just like not all programs can be trusted neither can all networks. &lt;br /&gt;
** Firewalls aren&#039;t only way to limit connections. Example, TCP wrappers: /etc/host.allow and /etc/host.deny&lt;br /&gt;
		&lt;br /&gt;
&lt;br /&gt;
* Disk encryption&lt;br /&gt;
**Used to protect the information stored on disk from unauthorized users. &lt;br /&gt;
* SSH (secure shell).&lt;br /&gt;
** Used to remotely log into a unix system. &lt;br /&gt;
**SSH key is used to authenticate the user.  &lt;br /&gt;
* Notion of secure downloads on Ubuntu using &amp;quot;apt-get&amp;quot;. It&#039;s Utility used to install software packages and even upgrade the OS.&lt;br /&gt;
	  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Important Concepts:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
We briefly discussed the concept of what makes an OS secure.&lt;br /&gt;
&lt;br /&gt;
What to trust in an OS?&lt;br /&gt;
* Kernel&lt;br /&gt;
* all root priviledged code&lt;br /&gt;
* daemons + set UID programs&lt;br /&gt;
* file system permissions&lt;br /&gt;
&lt;br /&gt;
Applications don&#039;t interact with untrusted sources or are &amp;quot;locked down&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
boot process&lt;br /&gt;
&lt;br /&gt;
The modern OS is a mess. That is with the amount of complexity (the millions of lines of code) in a modern OS it&#039;s difficult (close to impossible) to ensure security.&lt;br /&gt;
&lt;br /&gt;
Trusted Computing Base (TCB). TCB is synonymous with &amp;quot;trust model&amp;quot;. In other words it defines software and data that OS relies on to enforce it&#039;s security goals. Ideally, the TCB should be minimal.&lt;/div&gt;</summary>
		<author><name>Dusanrozman</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_2&amp;diff=20508</id>
		<title>SystemsSec 2016W Lecture 2</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_2&amp;diff=20508"/>
		<updated>2016-01-14T20:32:54Z</updated>

		<summary type="html">&lt;p&gt;Dusanrozman: Added notes for Jan 12th lecture. Work done by Dusan Rozman Xiusan Zhou&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Topics &amp;amp; Readings&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Operating system security&lt;br /&gt;
* Trusted computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Class Notes:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Security mechanisms in a Unix system:&lt;br /&gt;
&lt;br /&gt;
* All processes have a user, group, and &amp;quot;effective user&amp;quot;. &lt;br /&gt;
* users&lt;br /&gt;
** passwords&lt;br /&gt;
** users have file permissions&lt;br /&gt;
** User input may cause vulnerabilities therefore the OS must control the input in some way.&lt;br /&gt;
&lt;br /&gt;
*Networks&lt;br /&gt;
** IP tables: allows system admin to configure tables provided by Linux kernel firewall&lt;br /&gt;
** firewall used to protect system and restrict communication from untrusted  sources.&lt;br /&gt;
** Just like not all programs can be trusted neither can all networks. &lt;br /&gt;
** Firewalls aren&#039;t only way to limit connections. Example, TCP wrappers: /etc/host.allow and /etc/host.deny&lt;br /&gt;
		&lt;br /&gt;
&lt;br /&gt;
* Disk encryption&lt;br /&gt;
**Used to protect the information stored on disk from unauthorized users. &lt;br /&gt;
* SSH (secure shell).&lt;br /&gt;
** Used to remotely log into a unix system. &lt;br /&gt;
**SSH key is used to authenticate the user.  &lt;br /&gt;
* Notion of secure downloads on Ubuntu using &amp;quot;apt-get&amp;quot;. It&#039;s Utility used to install software packages and even upgrade the OS.&lt;br /&gt;
	  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Important Concepts:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
We briefly discussed the concept of what makes an OS secure.&lt;br /&gt;
&lt;br /&gt;
What to trust in an OS?&lt;br /&gt;
* Kernel&lt;br /&gt;
* all root priviledged code&lt;br /&gt;
* daemons + set UID programs&lt;br /&gt;
* file system permissions&lt;br /&gt;
&lt;br /&gt;
Applications don&#039;t interact with untrusted sources or are &amp;quot;locked down&amp;quot;&lt;br /&gt;
boot process&lt;br /&gt;
&lt;br /&gt;
The modern OS is a mess. That is with the amount of complexity (the millions of lines of code) in a modern OS it&#039;s difficult (close to impossible) to ensure security.&lt;br /&gt;
&lt;br /&gt;
Trusted Computing Base (TCB). TCB is synonymous with &amp;quot;trust model&amp;quot;. In other words it defines software and data that OS relies on to enforce it&#039;s security goals. Ideally, the TCB should be minimal.&lt;/div&gt;</summary>
		<author><name>Dusanrozman</name></author>
	</entry>
</feed>