SlideShare a Scribd company logo
Operating system
A system having basic kernel functions of process
and memory management ,file, i/o device and
network management functions and many other
functions.
Protection of memory and resources from any
unauthorized into the PCB or resource ,or mix up of
access of one by another becomes imperative.
Introduction to OS security
issues
 The OS security issue is a critical issue.
 Each process determines whether it has a control
of a system resoure exclusively or whether it is
isolated from the other processes or whether it
shares a resource common to a set of processes.
 The OS then configures when a resource is
isolated from from one process and a resource is
shared with a defined with a define set of
processes.
 The OS should also have the flexibility to change
this configuration when needed, to full fill the
requirements all the process.
 For example, a process has 32 memory blocks at
an instance and the OS configures the system
accordingly.
 The OS should provide protection mechanism
and implement a system administration(s) –
defined security policy.
 An application software programmer can find a
hole in the protection mechanism and an
unauthorized access.
Important security issues
 Protection mechanism
 Flexibility to of change.
Control resource sharing
 Confinement mechanism
 Security policy (strategy).
 Authentication mechanism.
 Authorization.
 Encryption
Protection Mechanism
 OS should provide protection mechanisms
and implement a system administrator (s)
defined security
Flexibility to of change
 when needed to fulfill the need
requirements of all the processes.
 For example, a process has control of 32
memory blocks at an instance and the OS
configured the system accordingly. t
 Later when more processes are created, this
can be reconfigured.
Controlled resource sharing
 Controlling read and write of the resources
and parameters by user processes.
 For example, some resources write only for
a process and some read only for a set of
processes
 Another example, memory buffer to which
one process writes at an instant till that
buffer is emptied by other process
Confinement Mechanism
 Mechanism that restricts sharing of
parameters to a set of processes only .
Security Policy (Strategy)
 Rules for authorizing access to the OS,
system and information.
 A policy example is that a communication
system may having a policy of peer-to-peer
communication (connection establishment
preceding the data packets flow).
Authentication Mechanism
 External authentication mechanism for the user
and a mechanism meant to prevent an
application run unless the user registers and the
system administrator (software) authorizes
 Internal authentication for the process, and the
process should not appear (impersonate) as some
like other processes.
 User authentication can become difficult if the
user disseminates password passwords or other
authentication methods
Authorization
 User or process (s) allowed to use the
system resources as per the security policy
Encryption
 A tool to change information to make it
unusable by any other user or process unless
without the appropriate key is used for
deciphering it.
CONCLUSION
 OS security issues are important
considerations.
 Protection of memory and resources from
any unauthorized and without explicit
authorization write into the PCB or
resource
 Mix up of accesses of one by
another, becomes imperative from an OS
security and protection mechanism
Os security issues

More Related Content

What's hot

Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
Zaheer720515
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
Kumar Pritam
 
Swap space management and protection in os
Swap space management and protection  in osSwap space management and protection  in os
Swap space management and protection in os
rajshreemuthiah
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
Aisha Talat
 
Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)
Ahmar Hashmi
 
File system
File systemFile system
File system
Harleen Johal
 
Software security
Software securitySoftware security
Software security
Roman Oliynykov
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
Karwan Mustafa Kareem
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Mukesh Chinta
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
Data flow architecture
Data flow architectureData flow architecture
Data flow architecture
Sourav Routh
 
I/O Management
I/O ManagementI/O Management
I/O Management
Keyur Vadodariya
 
FILE STRUCTURE IN DBMS
FILE STRUCTURE IN DBMSFILE STRUCTURE IN DBMS
FILE STRUCTURE IN DBMS
Abhishek Dutta
 
Free Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSFree Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFS
United International University
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 

What's hot (20)

Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Swap space management and protection in os
Swap space management and protection  in osSwap space management and protection  in os
Swap space management and protection in os
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)
 
File system
File systemFile system
File system
 
Software security
Software securitySoftware security
Software security
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Data flow architecture
Data flow architectureData flow architecture
Data flow architecture
 
I/O Management
I/O ManagementI/O Management
I/O Management
 
FILE STRUCTURE IN DBMS
FILE STRUCTURE IN DBMSFILE STRUCTURE IN DBMS
FILE STRUCTURE IN DBMS
 
Free Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSFree Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFS
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 

Similar to Os security issues

CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mn
dejenehundaol91
 
ch3 - operating system structures.ppt
ch3 - operating system structures.pptch3 - operating system structures.ppt
ch3 - operating system structures.ppt
divyang32
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptx
Prudhvi668506
 
OPERATING SYSTEM PRESENTION.pdf
OPERATING SYSTEM PRESENTION.pdfOPERATING SYSTEM PRESENTION.pdf
OPERATING SYSTEM PRESENTION.pdf
KRISHNAMLM
 
Unit 1-Operating Systems Overview .pptx
Unit 1-Operating Systems Overview .pptxUnit 1-Operating Systems Overview .pptx
Unit 1-Operating Systems Overview .pptx
ThamaraiselviAvinuty
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in os
DevAdnani
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
Deborah Obasogie
 
System components (os)
System components (os)System components (os)
System components (os)
snegacmr
 
Operating system
Operating systemOperating system
Operating system
ǷřiţëƧh Chąuhąn
 
Ch3
Ch3Ch3
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
Jaleto Sunkemo
 
Understanding Basics of OS
Understanding Basics of OSUnderstanding Basics of OS
Understanding Basics of OS
E.M.G.yadava womens college
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
amiable_indian
 
OpeatingSystemPPT
OpeatingSystemPPTOpeatingSystemPPT
OpeatingSystemPPT
DrPrabakaranPerumal
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01
wardell henley
 
Os lecture 6
Os lecture 6Os lecture 6
Os lecture 6
Dr. Ahmed J. Obaid
 
VOSUnit
VOSUnitVOSUnit
Ch3 OS
Ch3 OSCh3 OS
Ch3 OS
C.U
 
OS_Ch3
OS_Ch3OS_Ch3

Similar to Os security issues (20)

CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mn
 
ch3 - operating system structures.ppt
ch3 - operating system structures.pptch3 - operating system structures.ppt
ch3 - operating system structures.ppt
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptx
 
OPERATING SYSTEM PRESENTION.pdf
OPERATING SYSTEM PRESENTION.pdfOPERATING SYSTEM PRESENTION.pdf
OPERATING SYSTEM PRESENTION.pdf
 
Unit 1-Operating Systems Overview .pptx
Unit 1-Operating Systems Overview .pptxUnit 1-Operating Systems Overview .pptx
Unit 1-Operating Systems Overview .pptx
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in os
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
System components (os)
System components (os)System components (os)
System components (os)
 
Operating system
Operating systemOperating system
Operating system
 
Ch3
Ch3Ch3
Ch3
 
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
 
Understanding Basics of OS
Understanding Basics of OSUnderstanding Basics of OS
Understanding Basics of OS
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
OpeatingSystemPPT
OpeatingSystemPPTOpeatingSystemPPT
OpeatingSystemPPT
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01
 
Os lecture 6
Os lecture 6Os lecture 6
Os lecture 6
 
VOSUnit
VOSUnitVOSUnit
VOSUnit
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OS
 
OS_Ch3
OS_Ch3OS_Ch3
OS_Ch3
 

More from JOLLUSUDARSHANREDDY

RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
JOLLUSUDARSHANREDDY
 
MEMORY MANAGEMENT
MEMORY MANAGEMENTMEMORY MANAGEMENT
MEMORY MANAGEMENT
JOLLUSUDARSHANREDDY
 
Basic functions & types of RTOS ES
Basic functions & types of  RTOS ESBasic functions & types of  RTOS ES
Basic functions & types of RTOS ES
JOLLUSUDARSHANREDDY
 
RTOS LINUX2.6.X & LINUX2.6.24
 RTOS    LINUX2.6.X & LINUX2.6.24 RTOS    LINUX2.6.X & LINUX2.6.24
RTOS LINUX2.6.X & LINUX2.6.24
JOLLUSUDARSHANREDDY
 
OSEK / VDX
OSEK / VDXOSEK / VDX
OSEK / VDX
JOLLUSUDARSHANREDDY
 
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENTDEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
JOLLUSUDARSHANREDDY
 
INTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT LATENCY AND RESPONSE OF THE TASKINTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT LATENCY AND RESPONSE OF THE TASK
JOLLUSUDARSHANREDDY
 
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLSINTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
JOLLUSUDARSHANREDDY
 
Rt linux-lab1
Rt linux-lab1Rt linux-lab1
Rt linux-lab1
JOLLUSUDARSHANREDDY
 
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
JOLLUSUDARSHANREDDY
 
WINDOWS-CE
WINDOWS-CEWINDOWS-CE
Automated system for fault analysis in industries using
Automated system for fault analysis  in industries usingAutomated system for fault analysis  in industries using
Automated system for fault analysis in industries using
JOLLUSUDARSHANREDDY
 
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
JOLLUSUDARSHANREDDY
 
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
 SOLAR  TRACKING  SYSTEM  BY  USING  MICROCONTROLLER SOLAR  TRACKING  SYSTEM  BY  USING  MICROCONTROLLER
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
JOLLUSUDARSHANREDDY
 
Zigbee Based Solar Light System By Using LDR
Zigbee Based Solar Light System By Using LDRZigbee Based Solar Light System By Using LDR
Zigbee Based Solar Light System By Using LDR
JOLLUSUDARSHANREDDY
 
Design of smart nodes for wireless sensor network ...
Design of smart nodes for wireless sensor network                            ...Design of smart nodes for wireless sensor network                            ...
Design of smart nodes for wireless sensor network ...
JOLLUSUDARSHANREDDY
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
JOLLUSUDARSHANREDDY
 
BOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPSBOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPS
JOLLUSUDARSHANREDDY
 
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFIDSTUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
JOLLUSUDARSHANREDDY
 
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
SOLAR BASED MOBILE CHARGER IN RURAL AREASSOLAR BASED MOBILE CHARGER IN RURAL AREAS
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
JOLLUSUDARSHANREDDY
 

More from JOLLUSUDARSHANREDDY (20)

RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
 
MEMORY MANAGEMENT
MEMORY MANAGEMENTMEMORY MANAGEMENT
MEMORY MANAGEMENT
 
Basic functions & types of RTOS ES
Basic functions & types of  RTOS ESBasic functions & types of  RTOS ES
Basic functions & types of RTOS ES
 
RTOS LINUX2.6.X & LINUX2.6.24
 RTOS    LINUX2.6.X & LINUX2.6.24 RTOS    LINUX2.6.X & LINUX2.6.24
RTOS LINUX2.6.X & LINUX2.6.24
 
OSEK / VDX
OSEK / VDXOSEK / VDX
OSEK / VDX
 
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENTDEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
 
INTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT LATENCY AND RESPONSE OF THE TASKINTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT LATENCY AND RESPONSE OF THE TASK
 
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLSINTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
 
Rt linux-lab1
Rt linux-lab1Rt linux-lab1
Rt linux-lab1
 
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
 
WINDOWS-CE
WINDOWS-CEWINDOWS-CE
WINDOWS-CE
 
Automated system for fault analysis in industries using
Automated system for fault analysis  in industries usingAutomated system for fault analysis  in industries using
Automated system for fault analysis in industries using
 
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
 
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
 SOLAR  TRACKING  SYSTEM  BY  USING  MICROCONTROLLER SOLAR  TRACKING  SYSTEM  BY  USING  MICROCONTROLLER
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
 
Zigbee Based Solar Light System By Using LDR
Zigbee Based Solar Light System By Using LDRZigbee Based Solar Light System By Using LDR
Zigbee Based Solar Light System By Using LDR
 
Design of smart nodes for wireless sensor network ...
Design of smart nodes for wireless sensor network                            ...Design of smart nodes for wireless sensor network                            ...
Design of smart nodes for wireless sensor network ...
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
 
BOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPSBOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPS
 
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFIDSTUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
 
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
SOLAR BASED MOBILE CHARGER IN RURAL AREASSOLAR BASED MOBILE CHARGER IN RURAL AREAS
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
 

Recently uploaded

Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 

Recently uploaded (20)

Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 

Os security issues

  • 1. Operating system A system having basic kernel functions of process and memory management ,file, i/o device and network management functions and many other functions. Protection of memory and resources from any unauthorized into the PCB or resource ,or mix up of access of one by another becomes imperative.
  • 2. Introduction to OS security issues  The OS security issue is a critical issue.  Each process determines whether it has a control of a system resoure exclusively or whether it is isolated from the other processes or whether it shares a resource common to a set of processes.  The OS then configures when a resource is isolated from from one process and a resource is shared with a defined with a define set of processes.
  • 3.  The OS should also have the flexibility to change this configuration when needed, to full fill the requirements all the process.  For example, a process has 32 memory blocks at an instance and the OS configures the system accordingly.  The OS should provide protection mechanism and implement a system administration(s) – defined security policy.  An application software programmer can find a hole in the protection mechanism and an unauthorized access.
  • 4. Important security issues  Protection mechanism  Flexibility to of change. Control resource sharing  Confinement mechanism  Security policy (strategy).  Authentication mechanism.  Authorization.  Encryption
  • 5. Protection Mechanism  OS should provide protection mechanisms and implement a system administrator (s) defined security
  • 6. Flexibility to of change  when needed to fulfill the need requirements of all the processes.  For example, a process has control of 32 memory blocks at an instance and the OS configured the system accordingly. t  Later when more processes are created, this can be reconfigured.
  • 7. Controlled resource sharing  Controlling read and write of the resources and parameters by user processes.  For example, some resources write only for a process and some read only for a set of processes  Another example, memory buffer to which one process writes at an instant till that buffer is emptied by other process
  • 8. Confinement Mechanism  Mechanism that restricts sharing of parameters to a set of processes only .
  • 9. Security Policy (Strategy)  Rules for authorizing access to the OS, system and information.  A policy example is that a communication system may having a policy of peer-to-peer communication (connection establishment preceding the data packets flow).
  • 10. Authentication Mechanism  External authentication mechanism for the user and a mechanism meant to prevent an application run unless the user registers and the system administrator (software) authorizes  Internal authentication for the process, and the process should not appear (impersonate) as some like other processes.  User authentication can become difficult if the user disseminates password passwords or other authentication methods
  • 11. Authorization  User or process (s) allowed to use the system resources as per the security policy
  • 12. Encryption  A tool to change information to make it unusable by any other user or process unless without the appropriate key is used for deciphering it.
  • 13. CONCLUSION  OS security issues are important considerations.  Protection of memory and resources from any unauthorized and without explicit authorization write into the PCB or resource  Mix up of accesses of one by another, becomes imperative from an OS security and protection mechanism