SlideShare a Scribd company logo
Operating System
SECURITY
INTRODUCTION
Security of a computer system is a crucial task. It is a process of ensuring confidentiality and integrity
of the OS.
On the other hand, this requires only adequate protection system but also consideration of external
environment within which the system operates.
A system is said to be secure if its resources are used and accessed as intended under all the
circumstances.
SECURITY PROBLEM
So, How exactly this security problem occurs ?
● In large commercial systems containing payroll or other financial data are inviting targets to
thieves
● We say that a system is secure if its resources are used and accessed as intended under all
circumstances.
● So, for this we must have mechanisms to make security breaches a rare occurrence rather
than normal conditions.
SECURITY VIOLATIONS
A security violation or infraction is any breach of security regulations, requirements, procedures or guidelines,
whether or not a compromise results.
Security of a system can be threatened via two violations:
● Threat: A program which has the potential to cause serious damage to the system.
● Attack: An attempt to break security and make unauthorized use of an asset.
This System violations can be categorized into intentional and accidental.
● Intentional, A kind of harmful computer code or web script designed to create system vulnerabilities
leading to back doors and security breaches. Also known as MALICIOUS
● Accidental, on the other hand, are comparatively easier to be protected against.
○ Example: Denial of service DDoS Attack
BREACHES
Security can be compromised via any of the breaches mentioned:
● Breach of confidentiality: This type of violation involves the unauthorized reading of data.
● Breach of integrity: This violation involves unauthorized modification of data.
● Breach of availability: It involves an unauthorized destruction of data.
● Theft of service: It involves an unauthorized use of resources.
● Denial of service: It involves preventing legitimate use of the system.
As mentioned before, such attacks can be accidental in nature.
SECURITY SYSTEM GOALS
1. Integrity:
The objects in the system mustn’t be accessed by any unauthorized user & any user not having sufficient rights
should not be allowed to modify the important system files and resources.
2. Secrecy:
The objects of the system must be accessible only to a limited number of authorized users. Not everyone
should be able to view the system files.
3. Availability:
In this kind of situation, a malware might hog the resources for itself & thus preventing the legitimate
processes from accessing the system resources.
METHODS
Attackers use several standard methods in their attempts to breach the security.
● One common attack is masquerading, in which the attacker pretends to be a trusted third party. A
variation of this is the man-in-the-middle, in which the attacker masquerades as both ends of the
conversation to two targets.
● A replay attack involves repeating a valid transmission. Sometimes this can be the entire attack, (
such as repeating a request for a money transfer ), or other times the content of the original message is
replaced with malicious content.
SECURITY ATTACK
● Consider the damage that could be done if a request for authentication had a legitimate users
information replaced with an unauthorized users. yet another kind of attack is the man-in-the-middle
attack, in which an attacker sits in the data flow of a communication, masquerading as the sender to
the receiver, and vice-versa.
● In a network communication, a man-in-the-middle attack may be preceded by a session hijacking, in
which an active communication session is intercepted.
● In some cases, such as a denial-of-service attack, it is preferable to prevent the attack but sufficient to
detect the attack so that the counter measures can be taken.
several attacks are depicted in the following diagram
SECURITY MEASURES
● There are four levels at which a system must be protected:
1. Physical - The easiest way to steal data is to pocket the backup tapes. Also, access to the root console will
often give the user special privileges, such as rebooting the system as root from removable media. Even
general access to terminals in a computer room offers some opportunities for an attacker.
2. Human - There is some concern that the humans who are allowed access to a system be trustworthy, and
that they cannot be coerced into breaching security.
■ Phishing involves sending an innocent-looking e-mail or web site designed to fool people into
revealing confidential information..
■ Dumpster Diving involves searching the trash or other locations for passwords that are written
down.
■ Password Cracking involves divining users passwords, either by watching them type in their
passwords, knowing something about them like their pet's names, or simply trying all words in
common dictionaries.
SECURITY MEASURES
3. Operating System - The OS must protect itself from security breaches, such as runaway processes, memory-access
violations, stack overflow violations, the launching of programs with excessive privileges, and many others.
4. Network - As network communications become ever more important and pervasive in modern computing
environments, it becomes ever more important to protect this area of the system. This is a growing area of concern as
wireless communications and portable devices become more and more prevalent.
DIFFERENCE BETWEEN
SECURITY AND PROTECTION
SECURITY
► Security grants the system access to the
appropriate users only.
► External threats are involved.
► More convoluted queries are handled.
► Security illustrates that which person is granted for
using the system.
► Encryption and certification mechanisms are used.
PROTECTION
► While protection deals with the access to the system
resources.
► Internal threats are involved.
► Simple queries are handled.
► Whereas protection determines that what files can be
accessed or permeated by a special user.
► Authorization mechanism is implemented.
CONCLUSION
Security at the physical and human levels, although important is for the most part beyond the scope.
The security of Operating System depends on us because the more precautions we will take the more
secure our Operating System will be.
Security within the operating system and also in between the operating system is implemented in
several ways ranging from passwords of authentication through guarding against viruses to detecting
intrusions.
THANK YOU !

More Related Content

What's hot

Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Network attacks
Network attacksNetwork attacks
Network attacks
Manjushree Mashal
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Firewall ppt
Firewall pptFirewall ppt
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
afaque jaya
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
Mustafash79
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
Shreedevi Tharanidharan
 
What is malware
What is malwareWhat is malware
What is malware
Malcolm York
 
Paging and segmentation
Paging and segmentationPaging and segmentation
Paging and segmentation
Piyush Rochwani
 

What's hot (20)

Operating system security
Operating system securityOperating system security
Operating system security
 
Network security
Network securityNetwork security
Network security
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Network security
Network security Network security
Network security
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Operating system security
Operating system securityOperating system security
Operating system security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Network security
Network securityNetwork security
Network security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
What is malware
What is malwareWhat is malware
What is malware
 
Paging and segmentation
Paging and segmentationPaging and segmentation
Paging and segmentation
 

Similar to OPERATING SYSTEM SECURITY

System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
Kushagr sharma
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
miki304759
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
Chapter-I introduction
Chapter-I introductionChapter-I introduction
Chapter-I introduction
Dr.Florence Dayana
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
Dr.Florence Dayana
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
Temesgen Berhanu
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
vkarthi314
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
deepakbharathi16
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
ssuser6e8e41
 
Information security
Information securityInformation security
Information security
Rohit Gir
 
1.pptx
1.pptx1.pptx
1.pptx
alaakaraja1
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
Manoj VNV
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1
123aleena
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 

Similar to OPERATING SYSTEM SECURITY (20)

System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
System Security
System SecuritySystem Security
System Security
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Chapter-I introduction
Chapter-I introductionChapter-I introduction
Chapter-I introduction
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Information security
Information securityInformation security
Information security
 
1.pptx
1.pptx1.pptx
1.pptx
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 

More from RohitK71

VIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGYVIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGY
RohitK71
 
Gram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsGram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellations
RohitK71
 
Negotiation
Negotiation Negotiation
Negotiation
RohitK71
 
QUEUEING NETWORKS
QUEUEING NETWORKSQUEUEING NETWORKS
QUEUEING NETWORKS
RohitK71
 
INTEGRATION TESTING
INTEGRATION TESTINGINTEGRATION TESTING
INTEGRATION TESTING
RohitK71
 
INHERITANCE
INHERITANCEINHERITANCE
INHERITANCE
RohitK71
 
Dbms seminar
Dbms seminarDbms seminar
Dbms seminar
RohitK71
 
Cn application layer_paradigms
Cn application layer_paradigmsCn application layer_paradigms
Cn application layer_paradigms
RohitK71
 
Compiler design error handling
Compiler design error handlingCompiler design error handling
Compiler design error handling
RohitK71
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)
RohitK71
 
Usp message queues
Usp message queuesUsp message queues
Usp message queues
RohitK71
 

More from RohitK71 (11)

VIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGYVIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGY
 
Gram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsGram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellations
 
Negotiation
Negotiation Negotiation
Negotiation
 
QUEUEING NETWORKS
QUEUEING NETWORKSQUEUEING NETWORKS
QUEUEING NETWORKS
 
INTEGRATION TESTING
INTEGRATION TESTINGINTEGRATION TESTING
INTEGRATION TESTING
 
INHERITANCE
INHERITANCEINHERITANCE
INHERITANCE
 
Dbms seminar
Dbms seminarDbms seminar
Dbms seminar
 
Cn application layer_paradigms
Cn application layer_paradigmsCn application layer_paradigms
Cn application layer_paradigms
 
Compiler design error handling
Compiler design error handlingCompiler design error handling
Compiler design error handling
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)
 
Usp message queues
Usp message queuesUsp message queues
Usp message queues
 

Recently uploaded

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 

Recently uploaded (20)

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 

OPERATING SYSTEM SECURITY

  • 2. INTRODUCTION Security of a computer system is a crucial task. It is a process of ensuring confidentiality and integrity of the OS. On the other hand, this requires only adequate protection system but also consideration of external environment within which the system operates. A system is said to be secure if its resources are used and accessed as intended under all the circumstances.
  • 3. SECURITY PROBLEM So, How exactly this security problem occurs ? ● In large commercial systems containing payroll or other financial data are inviting targets to thieves ● We say that a system is secure if its resources are used and accessed as intended under all circumstances. ● So, for this we must have mechanisms to make security breaches a rare occurrence rather than normal conditions.
  • 4. SECURITY VIOLATIONS A security violation or infraction is any breach of security regulations, requirements, procedures or guidelines, whether or not a compromise results. Security of a system can be threatened via two violations: ● Threat: A program which has the potential to cause serious damage to the system. ● Attack: An attempt to break security and make unauthorized use of an asset. This System violations can be categorized into intentional and accidental. ● Intentional, A kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors and security breaches. Also known as MALICIOUS ● Accidental, on the other hand, are comparatively easier to be protected against. ○ Example: Denial of service DDoS Attack
  • 5. BREACHES Security can be compromised via any of the breaches mentioned: ● Breach of confidentiality: This type of violation involves the unauthorized reading of data. ● Breach of integrity: This violation involves unauthorized modification of data. ● Breach of availability: It involves an unauthorized destruction of data. ● Theft of service: It involves an unauthorized use of resources. ● Denial of service: It involves preventing legitimate use of the system. As mentioned before, such attacks can be accidental in nature.
  • 6. SECURITY SYSTEM GOALS 1. Integrity: The objects in the system mustn’t be accessed by any unauthorized user & any user not having sufficient rights should not be allowed to modify the important system files and resources. 2. Secrecy: The objects of the system must be accessible only to a limited number of authorized users. Not everyone should be able to view the system files. 3. Availability: In this kind of situation, a malware might hog the resources for itself & thus preventing the legitimate processes from accessing the system resources.
  • 7. METHODS Attackers use several standard methods in their attempts to breach the security. ● One common attack is masquerading, in which the attacker pretends to be a trusted third party. A variation of this is the man-in-the-middle, in which the attacker masquerades as both ends of the conversation to two targets. ● A replay attack involves repeating a valid transmission. Sometimes this can be the entire attack, ( such as repeating a request for a money transfer ), or other times the content of the original message is replaced with malicious content.
  • 8. SECURITY ATTACK ● Consider the damage that could be done if a request for authentication had a legitimate users information replaced with an unauthorized users. yet another kind of attack is the man-in-the-middle attack, in which an attacker sits in the data flow of a communication, masquerading as the sender to the receiver, and vice-versa. ● In a network communication, a man-in-the-middle attack may be preceded by a session hijacking, in which an active communication session is intercepted. ● In some cases, such as a denial-of-service attack, it is preferable to prevent the attack but sufficient to detect the attack so that the counter measures can be taken. several attacks are depicted in the following diagram
  • 9.
  • 10. SECURITY MEASURES ● There are four levels at which a system must be protected: 1. Physical - The easiest way to steal data is to pocket the backup tapes. Also, access to the root console will often give the user special privileges, such as rebooting the system as root from removable media. Even general access to terminals in a computer room offers some opportunities for an attacker. 2. Human - There is some concern that the humans who are allowed access to a system be trustworthy, and that they cannot be coerced into breaching security. ■ Phishing involves sending an innocent-looking e-mail or web site designed to fool people into revealing confidential information.. ■ Dumpster Diving involves searching the trash or other locations for passwords that are written down. ■ Password Cracking involves divining users passwords, either by watching them type in their passwords, knowing something about them like their pet's names, or simply trying all words in common dictionaries.
  • 11. SECURITY MEASURES 3. Operating System - The OS must protect itself from security breaches, such as runaway processes, memory-access violations, stack overflow violations, the launching of programs with excessive privileges, and many others. 4. Network - As network communications become ever more important and pervasive in modern computing environments, it becomes ever more important to protect this area of the system. This is a growing area of concern as wireless communications and portable devices become more and more prevalent.
  • 12. DIFFERENCE BETWEEN SECURITY AND PROTECTION SECURITY ► Security grants the system access to the appropriate users only. ► External threats are involved. ► More convoluted queries are handled. ► Security illustrates that which person is granted for using the system. ► Encryption and certification mechanisms are used. PROTECTION ► While protection deals with the access to the system resources. ► Internal threats are involved. ► Simple queries are handled. ► Whereas protection determines that what files can be accessed or permeated by a special user. ► Authorization mechanism is implemented.
  • 13. CONCLUSION Security at the physical and human levels, although important is for the most part beyond the scope. The security of Operating System depends on us because the more precautions we will take the more secure our Operating System will be. Security within the operating system and also in between the operating system is implemented in several ways ranging from passwords of authentication through guarding against viruses to detecting intrusions.