SlideShare a Scribd company logo
SECURITY
ISSUES
PRESENTED BY DEV ADNANI
OPERATING SYSTEM
An operating system is system software that manages
computer hardware, software resources, and provides
common services for computer programs
INTRODUCTION TO OS SECURITY
ISSUES
• The OS security issue is a critical issue.
• Each process determines whether it has a control of a system
resource exclusively or whether it is isolated from the other
processes
• The OS then configures when a resource is isolated from from one process
and a resource is shared with a defined with a define set of processes
• The OS should also have the flexibility to change this configuration when
needed, to full fill the requirements all the process.
• The OS should provide protection mechanism
and implement a system administration(s) –
defined security policy.
• An application software programmer can find a hole
in the protection mechanism and an unauthorized access.
IMPORTANT SECURITY
ISSUES
PROTECTION
MECHANISM
• OS should provide protection mechanisms and implement a
system administrator defined security
FLEXIBILITY TO OF CHANGE
• When needed to fulfill the need requirements of all the processes
• For example, a process has control of 32 memory blocks at an instance
and the OS configured the system accordingly.
• Later when more processes are created, this can be reconfigured.
CONFINEMENT MECHANISM
• Mechanism that restricts sharing of parameters to a set of processes
only .
SECURITY POLICY
• Rules for authorizing access to the OS, system and information
• A policy example is that a communication system may having a policy
of peer-to-peer communication
AUTHENTICATION MECHANISM
• External authentication mechanism for the user and a mechanism
meant to prevent an application run unless the user registers and the
system administrator (software) authorizes
• Internal authentication for the process, and the process should not
appear as some like other processes.
• User authentication can become difficult if
the user disseminates password , passwords
or other authentication methods
AUTHORIZATION
• User or process (s) allowed to use the system resources as per the
security policy
ENCRYPTION
• A tool to change information to make it unusable by any other user or
process unless without the appropriate key is used for deciphering it.
• OS security issues are important
considerations
CONCLUSIO
N
• Protection of memory and resources from
any unauthorized and without explicit
authorization write into the resource
• Mix up of accesses of one by
another, becomes imperative from an OS
security and protection mechanism
THE END
PRESENTED BY DEV ADNANI
IU1983830001

More Related Content

What's hot

A Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long IslandA Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long Island
kimreview
 
Lesson 2 - System Specific Policy
Lesson 2 - System Specific PolicyLesson 2 - System Specific Policy
Lesson 2 - System Specific Policy
MLG College of Learning, Inc
 
Module2 introduction to os(cs)
Module2  introduction to os(cs)Module2  introduction to os(cs)
Module2 introduction to os(cs)Shukriyah Wahab
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security Concepts
Mohit Saxena
 
System administration(adeel khorram)
System administration(adeel khorram)System administration(adeel khorram)
System administration(adeel khorram)
Adeel Khurram
 
System component and system calls unit 1 by ram k paliwal
System component and system calls unit 1 by ram k paliwalSystem component and system calls unit 1 by ram k paliwal
System component and system calls unit 1 by ram k paliwal
Ram Paliwal
 
Shivani
ShivaniShivani
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
MEN Mikro Elektronik GmbH
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
G Prachi
 
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwal
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwalCpu register, instruction exucution and interrupts unit 1 by ram k paliwal
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwal
Ram Paliwal
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
Kudzi Chikwatu
 
Purpose of Embedded Systems
Purpose of Embedded Systems Purpose of Embedded Systems
Purpose of Embedded Systems
VijayKumar5738
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
Donald E. Hester
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
Angela Hauber
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
Microsoft TechNet - Belgium and Luxembourg
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
Maxwell Musonda
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseDesmond Devendran
 

What's hot (17)

A Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long IslandA Quick Look At The Computer Support Long Island
A Quick Look At The Computer Support Long Island
 
Lesson 2 - System Specific Policy
Lesson 2 - System Specific PolicyLesson 2 - System Specific Policy
Lesson 2 - System Specific Policy
 
Module2 introduction to os(cs)
Module2  introduction to os(cs)Module2  introduction to os(cs)
Module2 introduction to os(cs)
 
Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security Concepts
 
System administration(adeel khorram)
System administration(adeel khorram)System administration(adeel khorram)
System administration(adeel khorram)
 
System component and system calls unit 1 by ram k paliwal
System component and system calls unit 1 by ram k paliwalSystem component and system calls unit 1 by ram k paliwal
System component and system calls unit 1 by ram k paliwal
 
Shivani
ShivaniShivani
Shivani
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
 
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwal
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwalCpu register, instruction exucution and interrupts unit 1 by ram k paliwal
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwal
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Purpose of Embedded Systems
Purpose of Embedded Systems Purpose of Embedded Systems
Purpose of Embedded Systems
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 

Similar to Security issues in os

System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
rahulkumarcscsf21
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
vampugani
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
ams1ams11
 
Fundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptxFundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptx
KelvinDube4
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary Margarat
Mary Margarat
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
Seth Nurul
 
Os security issues
Os security issuesOs security issues
Os security issues
JOLLUSUDARSHANREDDY
 
Introduction to operating systems
 Introduction to operating systems Introduction to operating systems
Introduction to operating systems
Kumbirai Junior Muzavazi
 
Section01 overview (1)
Section01 overview (1)Section01 overview (1)
Section01 overview (1)Vimarsh Padha
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
StBulteBelay
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
StBulteBelay
 
Section01-Overview.ppt
Section01-Overview.pptSection01-Overview.ppt
Section01-Overview.ppt
WaltonJrSmithTZ
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
YashikaJain82
 
Date security security principles
Date security   security principlesDate security   security principles
Date security security principles
Leo Mark Villar
 
Operating System-adi.pdf
Operating System-adi.pdfOperating System-adi.pdf
Operating System-adi.pdf
Prof. Dr. K. Adisesha
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
UsamaKhan987353
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models7wounders
 
1. Introduction to OS.ppt
1. Introduction to OS.ppt1. Introduction to OS.ppt
1. Introduction to OS.ppt
SATHYABAMAMADHANKUMA
 
How Operating system works.
How Operating system works. How Operating system works.
How Operating system works.
Fahad Farooq
 

Similar to Security issues in os (20)

System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
 
Fundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptxFundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptx
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary Margarat
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Os security issues
Os security issuesOs security issues
Os security issues
 
Introduction to operating systems
 Introduction to operating systems Introduction to operating systems
Introduction to operating systems
 
Section01 overview (1)
Section01 overview (1)Section01 overview (1)
Section01 overview (1)
 
Section01 overview
Section01 overviewSection01 overview
Section01 overview
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
 
OS chapter 1.pptx
OS chapter 1.pptxOS chapter 1.pptx
OS chapter 1.pptx
 
Section01-Overview.ppt
Section01-Overview.pptSection01-Overview.ppt
Section01-Overview.ppt
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
Date security security principles
Date security   security principlesDate security   security principles
Date security security principles
 
Operating System-adi.pdf
Operating System-adi.pdfOperating System-adi.pdf
Operating System-adi.pdf
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models
 
1. Introduction to OS.ppt
1. Introduction to OS.ppt1. Introduction to OS.ppt
1. Introduction to OS.ppt
 
How Operating system works.
How Operating system works. How Operating system works.
How Operating system works.
 

More from DevAdnani

Joker Analysis
Joker AnalysisJoker Analysis
Joker Analysis
DevAdnani
 
Coding principles
Coding principles Coding principles
Coding principles
DevAdnani
 
JDBC : Java Database Connectivity
JDBC : Java Database Connectivity JDBC : Java Database Connectivity
JDBC : Java Database Connectivity
DevAdnani
 
Amazon Case Study 2021
Amazon Case Study 2021Amazon Case Study 2021
Amazon Case Study 2021
DevAdnani
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
DevAdnani
 
Data mining
 Data mining Data mining
Data mining
DevAdnani
 
Abstarction & Encapsulation
Abstarction & EncapsulationAbstarction & Encapsulation
Abstarction & Encapsulation
DevAdnani
 
Women entrepreneurship
Women entrepreneurship Women entrepreneurship
Women entrepreneurship
DevAdnani
 

More from DevAdnani (8)

Joker Analysis
Joker AnalysisJoker Analysis
Joker Analysis
 
Coding principles
Coding principles Coding principles
Coding principles
 
JDBC : Java Database Connectivity
JDBC : Java Database Connectivity JDBC : Java Database Connectivity
JDBC : Java Database Connectivity
 
Amazon Case Study 2021
Amazon Case Study 2021Amazon Case Study 2021
Amazon Case Study 2021
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
Data mining
 Data mining Data mining
Data mining
 
Abstarction & Encapsulation
Abstarction & EncapsulationAbstarction & Encapsulation
Abstarction & Encapsulation
 
Women entrepreneurship
Women entrepreneurship Women entrepreneurship
Women entrepreneurship
 

Recently uploaded

Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
AlejandraGmez176757
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
correoyaya
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
James Polillo
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
ewymefz
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
alex933524
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 

Recently uploaded (20)

Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 

Security issues in os

  • 2. OPERATING SYSTEM An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs
  • 3. INTRODUCTION TO OS SECURITY ISSUES • The OS security issue is a critical issue. • Each process determines whether it has a control of a system resource exclusively or whether it is isolated from the other processes • The OS then configures when a resource is isolated from from one process and a resource is shared with a defined with a define set of processes • The OS should also have the flexibility to change this configuration when needed, to full fill the requirements all the process.
  • 4. • The OS should provide protection mechanism and implement a system administration(s) – defined security policy. • An application software programmer can find a hole in the protection mechanism and an unauthorized access.
  • 6. PROTECTION MECHANISM • OS should provide protection mechanisms and implement a system administrator defined security
  • 7. FLEXIBILITY TO OF CHANGE • When needed to fulfill the need requirements of all the processes • For example, a process has control of 32 memory blocks at an instance and the OS configured the system accordingly. • Later when more processes are created, this can be reconfigured.
  • 8. CONFINEMENT MECHANISM • Mechanism that restricts sharing of parameters to a set of processes only .
  • 9. SECURITY POLICY • Rules for authorizing access to the OS, system and information • A policy example is that a communication system may having a policy of peer-to-peer communication
  • 10. AUTHENTICATION MECHANISM • External authentication mechanism for the user and a mechanism meant to prevent an application run unless the user registers and the system administrator (software) authorizes • Internal authentication for the process, and the process should not appear as some like other processes. • User authentication can become difficult if the user disseminates password , passwords or other authentication methods
  • 11. AUTHORIZATION • User or process (s) allowed to use the system resources as per the security policy
  • 12. ENCRYPTION • A tool to change information to make it unusable by any other user or process unless without the appropriate key is used for deciphering it.
  • 13. • OS security issues are important considerations CONCLUSIO N • Protection of memory and resources from any unauthorized and without explicit authorization write into the resource • Mix up of accesses of one by another, becomes imperative from an OS security and protection mechanism
  • 14. THE END PRESENTED BY DEV ADNANI IU1983830001