SlideShare a Scribd company logo
1 of 14
SECURITY AND PROTECTION IN OPERATING SYSTEM
Presented By :
MUSKAAN
MCA/25020/18
Introduction
 Interference in resource utilization is a
very serious threat in an OS
 The nature of the threat depends on the
nature of a resource and the manner in
which it is used.
Protection and Security
 OS use two sets of techniques to
counter threats to information namely:
 Protection
 Security
Protection
It involves guarding a user’s data and
programs against interference by other
authorized users of the system.
Security
It involves guarding of a user’s data
and programs against interference by
external entities, e.g. unauthorized
persons.
Facets to protection of information
 There are two facets to protection of
information
 Secrecy: Implies that only authorized users
should be able to access information.
 Privacy: Implies that information should be
used only for the purpose(s) for which it is
intended and shared.
Security and Protection: Policies and Mechanisms
Security:
Specify whether a person can
become a user of the system.
This function is performed by
the system administrator
Add or delete
users.
Verify whether a
person is an
authorized user.
Mechanisms:
Policy:
1.
2.
Protection:
Policy:
Mechanisms:
Specify whether a user can
access a specific file. The
owner of a file performs this
function while creating it.
Set or change protection
information for a file.
Check whether a file can
be accessed by a user.
2.
1.
Security Threats
 Direct: This is any direct attack on your
specific systems, whether from outside
hackers or from disgruntled insiders.
 Indirect: This is general random attack,
most commonly computer viruses,
computer worms or Trojan horses.
Reasons for taking Security measures
 To prevent loss of data
 To prevent corruption of data
 To prevent compromise of data
 TO prevent theft of data
 To prevent sabotage
GOALS OF SECURITY AND PROTECTION
Secrecy: Only authorized user should be able to access
information.
Privacy: Information should be used only for the purpose for
which it was intended and shared.
Authenticity: It should be possible to verify the source or
sender of the information and also verify the information has been
preserved in the form in which it was created or sent.
Integrity: It should not be possible to destroy or corrupt the
information .
AUTHENTICATION
Goal of Authentication: Reasonable assurance
that anyone who attempts to access a system
or a network is a legitimate user.
 2 Mechanisms:
Password
Biometric measure
Authentication using Biometrics
Use basic body properties to prove identity.
Examples include:
Fingerprints
voice
Hand size
Retina patterns
Facial features
Thank You

More Related Content

What's hot

30326851 -operating-system-unit-1-ppt
30326851 -operating-system-unit-1-ppt30326851 -operating-system-unit-1-ppt
30326851 -operating-system-unit-1-ppt
raj732723
 
introduction To Operating System
introduction To Operating Systemintroduction To Operating System
introduction To Operating System
Luka M G
 

What's hot (20)

Memory management ppt
Memory management pptMemory management ppt
Memory management ppt
 
Os
OsOs
Os
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
Operating systems By Awais
Operating systems By AwaisOperating systems By Awais
Operating systems By Awais
 
Protection and security
Protection and securityProtection and security
Protection and security
 
30326851 -operating-system-unit-1-ppt
30326851 -operating-system-unit-1-ppt30326851 -operating-system-unit-1-ppt
30326851 -operating-system-unit-1-ppt
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
operating system structure
operating system structureoperating system structure
operating system structure
 
INTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptxINTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptx
 
Desktop and multiprocessor systems
Desktop and multiprocessor systemsDesktop and multiprocessor systems
Desktop and multiprocessor systems
 
Protection and security of operating system
Protection and security of operating systemProtection and security of operating system
Protection and security of operating system
 
RAID
RAIDRAID
RAID
 
introduction To Operating System
introduction To Operating Systemintroduction To Operating System
introduction To Operating System
 
Types of operating system unit 1 by Ram K Paliwal
Types of operating system  unit 1 by Ram K PaliwalTypes of operating system  unit 1 by Ram K Paliwal
Types of operating system unit 1 by Ram K Paliwal
 

Similar to Security & Protection in Operating System

Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
ITNet
 
Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptx
dagiabebe267
 

Similar to Security & Protection in Operating System (20)

System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
1.pptx
1.pptx1.pptx
1.pptx
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
cyber secuirty.pptx
cyber secuirty.pptxcyber secuirty.pptx
cyber secuirty.pptx
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Computer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptxComputer security ppt for computer science student.pptx
Computer security ppt for computer science student.pptx
 
Security and management
Security and managementSecurity and management
Security and management
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Computer security
Computer securityComputer security
Computer security
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
IA 124 Lecture 01 2022 -23-1.pdf hahahah
IA 124 Lecture 01 2022 -23-1.pdf hahahahIA 124 Lecture 01 2022 -23-1.pdf hahahah
IA 124 Lecture 01 2022 -23-1.pdf hahahah
 

More from Meghaj Mallick

More from Meghaj Mallick (20)

24 partial-orderings
24 partial-orderings24 partial-orderings
24 partial-orderings
 
PORTFOLIO BY USING HTML & CSS
PORTFOLIO BY USING HTML & CSSPORTFOLIO BY USING HTML & CSS
PORTFOLIO BY USING HTML & CSS
 
Introduction to Software Testing
Introduction to Software TestingIntroduction to Software Testing
Introduction to Software Testing
 
Introduction to System Programming
Introduction to System ProgrammingIntroduction to System Programming
Introduction to System Programming
 
MACRO ASSEBLER
MACRO ASSEBLERMACRO ASSEBLER
MACRO ASSEBLER
 
Icons, Image & Multimedia
Icons, Image & MultimediaIcons, Image & Multimedia
Icons, Image & Multimedia
 
Project Tracking & SPC
Project Tracking & SPCProject Tracking & SPC
Project Tracking & SPC
 
Peephole Optimization
Peephole OptimizationPeephole Optimization
Peephole Optimization
 
Routing in MANET
Routing in MANETRouting in MANET
Routing in MANET
 
Macro assembler
 Macro assembler Macro assembler
Macro assembler
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Design Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software EngineeringDesign Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software Engineering
 
Text Mining of Twitter in Data Mining
Text Mining of Twitter in Data MiningText Mining of Twitter in Data Mining
Text Mining of Twitter in Data Mining
 
DFS & BFS in Computer Algorithm
DFS & BFS in Computer AlgorithmDFS & BFS in Computer Algorithm
DFS & BFS in Computer Algorithm
 
Software Development Method
Software Development MethodSoftware Development Method
Software Development Method
 
Secant method in Numerical & Statistical Method
Secant method in Numerical & Statistical MethodSecant method in Numerical & Statistical Method
Secant method in Numerical & Statistical Method
 
Motivation in Organization
Motivation in OrganizationMotivation in Organization
Motivation in Organization
 
Communication Skill
Communication SkillCommunication Skill
Communication Skill
 
Partial-Orderings in Discrete Mathematics
 Partial-Orderings in Discrete Mathematics Partial-Orderings in Discrete Mathematics
Partial-Orderings in Discrete Mathematics
 
Hashing In Data Structure
Hashing In Data Structure Hashing In Data Structure
Hashing In Data Structure
 

Recently uploaded

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Recently uploaded (18)

Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 

Security & Protection in Operating System

  • 1. SECURITY AND PROTECTION IN OPERATING SYSTEM Presented By : MUSKAAN MCA/25020/18
  • 2. Introduction  Interference in resource utilization is a very serious threat in an OS  The nature of the threat depends on the nature of a resource and the manner in which it is used.
  • 3. Protection and Security  OS use two sets of techniques to counter threats to information namely:  Protection  Security
  • 4. Protection It involves guarding a user’s data and programs against interference by other authorized users of the system.
  • 5. Security It involves guarding of a user’s data and programs against interference by external entities, e.g. unauthorized persons.
  • 6. Facets to protection of information  There are two facets to protection of information  Secrecy: Implies that only authorized users should be able to access information.  Privacy: Implies that information should be used only for the purpose(s) for which it is intended and shared.
  • 7. Security and Protection: Policies and Mechanisms Security: Specify whether a person can become a user of the system. This function is performed by the system administrator Add or delete users. Verify whether a person is an authorized user. Mechanisms: Policy: 1. 2.
  • 8. Protection: Policy: Mechanisms: Specify whether a user can access a specific file. The owner of a file performs this function while creating it. Set or change protection information for a file. Check whether a file can be accessed by a user. 2. 1.
  • 9. Security Threats  Direct: This is any direct attack on your specific systems, whether from outside hackers or from disgruntled insiders.  Indirect: This is general random attack, most commonly computer viruses, computer worms or Trojan horses.
  • 10. Reasons for taking Security measures  To prevent loss of data  To prevent corruption of data  To prevent compromise of data  TO prevent theft of data  To prevent sabotage
  • 11. GOALS OF SECURITY AND PROTECTION Secrecy: Only authorized user should be able to access information. Privacy: Information should be used only for the purpose for which it was intended and shared. Authenticity: It should be possible to verify the source or sender of the information and also verify the information has been preserved in the form in which it was created or sent. Integrity: It should not be possible to destroy or corrupt the information .
  • 12. AUTHENTICATION Goal of Authentication: Reasonable assurance that anyone who attempts to access a system or a network is a legitimate user.  2 Mechanisms: Password Biometric measure
  • 13. Authentication using Biometrics Use basic body properties to prove identity. Examples include: Fingerprints voice Hand size Retina patterns Facial features