SlideShare a Scribd company logo
1 of 44
Download to read offline
Unit - 4
security and protection
PREPARED BY:
MR. HARISH I. RATHOD
DEPARTMENT OF INFORMATION TECHNOLOGY.
GOVERNMENT POLYTECHNIC, HIMATNAGAR.
LINUX OPERATING SYSTEMS (4331602)
Unit Outcome
• .
2
Unit-4 Security and Protection
Justify the need of security
measures in Operating
System
Identify various program
threats and system threats
in OS
Justify the need of
protection mechanism in OS.
Summarize various
protection domain.
Exam Point of View
• .
3
Unit Name Teaching Hrs. R-Level U-Level A-Level Total Marks
Security and
Protection
08 08
Marks
06
Marks
00
Marks
14
Unit-4 Security and Protection
Lecture Outcome
• .
4
..
Explain
Security in
Operating
System
Lecture
Outcome
Unit-4 Security and Protection
Introduction
• The process of ensuring OS availability, confidentiality,
integrity is known as operating system security.
• Security is refers to providing safety for computer system
resources like software, CPU, memory, disks, etc.
• It can protect against all threats, including viruses and
unauthorized access.
• It can be enforced by assuring the operating system's
integrity, confidentiality, and availability.
5
Unit-4 Security and Protection
Q: Define operating system security
Security measures
• To protect the system, security measures can be taken at the
following levels:
• Physical.
• Human.
• Operating Systems.
• Networking Systems.
6
Unit-4 Security and Protection
Q: List out and explain security measures
Security measures
• Physical:
• The sites containing computer systems must be physically
secured against armed and malicious intruders.
• Workstations must be carefully protected.
7
Unit-4 Security and Protection
Q: List out and explain security measures
Security measures
• Human:
• Only appropriate users must have the authorization to access
the system.
• Phishing and Dumpster Diving must be avoid.
• Phishing: Collecting confidential information.
• Dumpster Diving: Collecting basic information so as to gain
unauthorized access.
8
Unit-4 Security and Protection
Q: List out and explain security measures
Security measures
• Operating System:
• Operating system must protect itself from accidental or
purposeful security breaches.
9
Unit-4 Security and Protection
Q: List out and explain security measures
Security measures
• Networking system:
• Almost all of the information is shared between different
system via a network.
• Intercepting these data could be just as harmful as breaking
into a computer.
• Hence, network should be properly secured against attacks.
10
Unit-4 Security and Protection
Q: List out and explain security measures
System Authentication
• It refers to identifying each user of the system and
associating the executing programs with those users.
• The OS ensures that a user who is running a particular
program is authentic.
11
Unit-4 Security and Protection
Q: Explain System Authentication
System Authentication
• The OS generally identifies/authenticates users using
following three ways:
• Username/Password.
• User key/card.
• Biometric based.
12
Unit-4 Security and Protection
Q: Explain System Authentication
System Authentication
• Username/Password: User need to enter a registered
username and password with OS.
• User key/card: User need to punch card in card slot, or
enter key to login into the system.
• Biometric based: User need to pass his/her attribute via
designated input device used by operating system to login
into the system.
13
Unit-4 Security and Protection
Q: Explain System Authentication
Threats
• Mainly two types of threads:
• Program threats.
• System threats.
14
Unit-4 Security and Protection
Threats
Program Threats
• The OS’s processes and kernel carry out the specified
task as directed.
• Program Threats occur, when a user program causes these
processes to do malicious operations.
• The common example is that when a program is installed
on a computer, it could store and transfer user credentials
to a hacker.
• There are various program threats.
• Some of them are as follows:.
15
Unit-4 Security and Protection
Q: Define program threats
Threats
Program Threats
• There are various program threats.
• Some of them are as follows:
• Virus.
• Trojan Horse.
• Logic Bomb.
• Trap Door.
16
Unit-4 Security and Protection
Q: List out and explain program threats
Threats
Program Threats
• Virus:
• A virus may replicate itself on the system.
• Viruses are extremely dangerous.
• It can modify/delete user files as well as crash computers.
• A virus is a little piece of code that is implemented on the
system program.
17
Unit-4 Security and Protection
Q: List out and explain program threats
Threats
Program Threats
• Virus:
• As the user interacts with the program,
• The virus becomes embedded in other files and programs,
potentially rendering the system inoperable.
18
Unit-4 Security and Protection
Q: List out and explain program threats
Threats
Program Threats
• Trojan Horse:
• This type of application captures user login credentials.
• It stores them to transfer them to a malicious user who
can then log in to the computer and access system
resources.
19
Unit-4 Security and Protection
Q: List out and explain program threats
Threats
Program Threats
• Logic Bomb:
• A logic bomb is a situation in which,
• Software only misbehaves when particular criteria are met;
• Otherwise, it functions normally.
20
Unit-4 Security and Protection
Q: List out and explain program threats
Threats
Program Threats
• Trap Door:
• A trap door is,
• When a program that is supposed to work as expected has
a security weakness in its code that allows it to do illegal
actions without the user's knowledge.
21
Unit-4 Security and Protection
Q: List out and explain program threats
Threats
System Threats
• System threats are described as the misuse of system
services and network connections to cause user problems.
• These threats may be used to trigger the program threats
over an entire network, known as program attacks.
• System threats make an environment in which OS resources
and user files may be misused.
• There are various system threats. Some of them are as
follows.
22
Unit-4 Security and Protection
Q: Define System threats
Threats
System Threats
• There are various system threats.
• Some of them are as follows:
• Port Scanning.
• Worm.
• Denial of service.
23
Unit-4 Security and Protection
Q: List out and explain System threats
Threats
System Threats
• Port Scanning:
• It is a method by which the cracker determines the
system's vulnerabilities for an attack.
• It is a fully automated process that includes connecting to a
specific port via TCP/IP.
• To protect the attacker's identity, port scanning attacks are
launched through Zombie Systems.
24
Unit-4 Security and Protection
Q: List out and explain System threats
Threats
System Threats
• Warm:
• The worm is a process that can choke a system's
performance by exhausting all system resources.
• A Worm process makes several clones,
• Each clone consuming system resources and preventing all
other processes from getting essential resources.
• Worm processes can even bring a network to a halt.
25
Unit-4 Security and Protection
Q: List out and explain System threats
Threats
System Threats
• Denial of service:
• Denial of service attacks usually prevents users from
legally using the system.
• For example,
• If a denial-of-service attack is executed against the browser's
content settings, a user may be unable to access the internet.
26
Unit-4 Security and Protection
Q: List out and explain System threats
Threats to OS
• Malware.
• Network intrusion.
27
Unit-4 Security and Protection
Ensure OS security
• Various ways to ensure.
• Authentication. (Username/Password, Biometric, card and
key)
• One Time Password. (Secret key, Random number, N/w
password)
• Firewalls.
• Physical security.
28
Unit-4 Security and Protection
Policies and Procedure
• Various policies may be implemented based on the
organization.
• In general,
• An OS security policy is a document that specifies the
procedures for ensuring that the operating system
maintains a specific level of integrity, confidentiality, and
availability.
29
Unit-4 Security and Protection
Q: Explain Operating System security policies and procedure
Policies and Procedure
• As we know, OS Security protects systems and data from
worms, malware, threats, etc.
• Security policies handle all preventative activities and
• Procedures to ensure an operating system's protection,
including steal, edited, and deleted data.
30
Unit-4 Security and Protection
Q: Explain Operating System security policies and procedure
Policies and Procedure
• As OS security policies and procedures cover a large area,
there are various techniques to addressing them.
• Some of them are as follows:
• 1) Installing and updating anti-virus software.
• 2) Ensure the systems are patched or updated regularly.
31
Unit-4 Security and Protection
Q: Explain Operating System security policies and procedure
Policies and Procedure
• 3) Implementing user management policies to protect user
accounts and privileges.
• 4) Installing a firewall and ensuring that it is properly set to
monitor all incoming and outgoing traffic.
32
Unit-4 Security and Protection
Q: Explain Operating System security policies and procedure
Protection mechanism
• System protection refers to the mechanisms implemented
by the operating system,
• To ensure the security and integrity of the system.
• It involves various techniques,
• To prevent unauthorized access, misuse, or modification
of the operating system and its resources.
33
Unit-4 Security and Protection
Protection mechanism
• Protection is especially important in a multiuser
environment,
• When multiple users use computer resources such as CPU,
memory, etc.
• It is the Operating system's responsibility to offer a
mechanism that protects each process from other
processes.
34
Unit-4 Security and Protection
Protection mechanism
• In a multiuser environment,
• All assets that require protection are classified as objects,
and
• Those that wish to access these objects are referred to as
subjects.
• The OS grants different 'access rights' to different
subjects.
35
Unit-4 Security and Protection
Protection mechanism
• There are several ways in which an OS can provide system
protection:
• User authentication.
• Access Control.
• Encryption.
• Firewall
• Antivirus Software.
• System updates and patches.
36
Unit-4 Security and Protection
System Protection
• Protection refers to a mechanism which controls the
access of programs, processes, or users to the resources
defined by a computer system.
37
Unit-4 Security and Protection
Q: Define system protection
Need of Protection
• To prevent the access of unauthorized users.
• To ensure that,
• Each active programs or processes in the system uses
resources only as the stated policy.
• To improve reliability by detecting latent errors.
38
Unit-4 Security and Protection
Q: Justify need of protection mechanism in OS
Protection Domain
• Various domains of protection in OS are as follows:
• Process's protected domain:
• The protection policies restrict each process's access to its
resource handling.
• A process is allowed to use only the necessary resources
with time constraints.
39
Unit-4 Security and Protection
Q: Explain protection domian
Protection Domain
• Process and object:
• They are abstract data types in a computer system, and
• These objects have operations that are unique to them.
• A domain component is defined as:.
40
Unit-4 Security and Protection
Q: Explain protection domian
<object, {set of operations on object}>
Protection Domain
• Collection of object:
• Each domain comprises a collection of objects.
• The operations may be implemented on objects.
• A domain could be made up of only one process,
procedure, or user.
• If a domain is linked with a procedure, then changing the
domain would mean changing the procedure ID.
• Objects may share one or more common operations..
41
Unit-4 Security and Protection
Q: Explain protection domian
Protection Domain
• ..
42
Unit-4 Security and Protection
Q: Explain protection domian
Introduction
• .
43
Unit-4 Security and Protection
44

More Related Content

Similar to Unit-4-LOS.pdf

M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS        Lecture-Mid Term.pptxM.Tech. IDS        Lecture-Mid Term.pptx
M.Tech. IDS Lecture-Mid Term.pptx
pawandeoli1
 
M.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universityM.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era university
pheonix4
 

Similar to Unit-4-LOS.pdf (20)

Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS        Lecture-Mid Term.pptxM.Tech. IDS        Lecture-Mid Term.pptx
M.Tech. IDS Lecture-Mid Term.pptx
 
M.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universityM.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era university
 
1 (20 files merged).ppt
1 (20 files merged).ppt1 (20 files merged).ppt
1 (20 files merged).ppt
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Unit v
Unit vUnit v
Unit v
 
Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdf
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptx
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Attackers process
Attackers processAttackers process
Attackers process
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Network security
Network securityNetwork security
Network security
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Protection and security of operating system
Protection and security of operating systemProtection and security of operating system
Protection and security of operating system
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Unit-4-LOS.pdf

  • 1. Unit - 4 security and protection PREPARED BY: MR. HARISH I. RATHOD DEPARTMENT OF INFORMATION TECHNOLOGY. GOVERNMENT POLYTECHNIC, HIMATNAGAR. LINUX OPERATING SYSTEMS (4331602)
  • 2. Unit Outcome • . 2 Unit-4 Security and Protection Justify the need of security measures in Operating System Identify various program threats and system threats in OS Justify the need of protection mechanism in OS. Summarize various protection domain.
  • 3. Exam Point of View • . 3 Unit Name Teaching Hrs. R-Level U-Level A-Level Total Marks Security and Protection 08 08 Marks 06 Marks 00 Marks 14 Unit-4 Security and Protection
  • 4. Lecture Outcome • . 4 .. Explain Security in Operating System Lecture Outcome Unit-4 Security and Protection
  • 5. Introduction • The process of ensuring OS availability, confidentiality, integrity is known as operating system security. • Security is refers to providing safety for computer system resources like software, CPU, memory, disks, etc. • It can protect against all threats, including viruses and unauthorized access. • It can be enforced by assuring the operating system's integrity, confidentiality, and availability. 5 Unit-4 Security and Protection Q: Define operating system security
  • 6. Security measures • To protect the system, security measures can be taken at the following levels: • Physical. • Human. • Operating Systems. • Networking Systems. 6 Unit-4 Security and Protection Q: List out and explain security measures
  • 7. Security measures • Physical: • The sites containing computer systems must be physically secured against armed and malicious intruders. • Workstations must be carefully protected. 7 Unit-4 Security and Protection Q: List out and explain security measures
  • 8. Security measures • Human: • Only appropriate users must have the authorization to access the system. • Phishing and Dumpster Diving must be avoid. • Phishing: Collecting confidential information. • Dumpster Diving: Collecting basic information so as to gain unauthorized access. 8 Unit-4 Security and Protection Q: List out and explain security measures
  • 9. Security measures • Operating System: • Operating system must protect itself from accidental or purposeful security breaches. 9 Unit-4 Security and Protection Q: List out and explain security measures
  • 10. Security measures • Networking system: • Almost all of the information is shared between different system via a network. • Intercepting these data could be just as harmful as breaking into a computer. • Hence, network should be properly secured against attacks. 10 Unit-4 Security and Protection Q: List out and explain security measures
  • 11. System Authentication • It refers to identifying each user of the system and associating the executing programs with those users. • The OS ensures that a user who is running a particular program is authentic. 11 Unit-4 Security and Protection Q: Explain System Authentication
  • 12. System Authentication • The OS generally identifies/authenticates users using following three ways: • Username/Password. • User key/card. • Biometric based. 12 Unit-4 Security and Protection Q: Explain System Authentication
  • 13. System Authentication • Username/Password: User need to enter a registered username and password with OS. • User key/card: User need to punch card in card slot, or enter key to login into the system. • Biometric based: User need to pass his/her attribute via designated input device used by operating system to login into the system. 13 Unit-4 Security and Protection Q: Explain System Authentication
  • 14. Threats • Mainly two types of threads: • Program threats. • System threats. 14 Unit-4 Security and Protection
  • 15. Threats Program Threats • The OS’s processes and kernel carry out the specified task as directed. • Program Threats occur, when a user program causes these processes to do malicious operations. • The common example is that when a program is installed on a computer, it could store and transfer user credentials to a hacker. • There are various program threats. • Some of them are as follows:. 15 Unit-4 Security and Protection Q: Define program threats
  • 16. Threats Program Threats • There are various program threats. • Some of them are as follows: • Virus. • Trojan Horse. • Logic Bomb. • Trap Door. 16 Unit-4 Security and Protection Q: List out and explain program threats
  • 17. Threats Program Threats • Virus: • A virus may replicate itself on the system. • Viruses are extremely dangerous. • It can modify/delete user files as well as crash computers. • A virus is a little piece of code that is implemented on the system program. 17 Unit-4 Security and Protection Q: List out and explain program threats
  • 18. Threats Program Threats • Virus: • As the user interacts with the program, • The virus becomes embedded in other files and programs, potentially rendering the system inoperable. 18 Unit-4 Security and Protection Q: List out and explain program threats
  • 19. Threats Program Threats • Trojan Horse: • This type of application captures user login credentials. • It stores them to transfer them to a malicious user who can then log in to the computer and access system resources. 19 Unit-4 Security and Protection Q: List out and explain program threats
  • 20. Threats Program Threats • Logic Bomb: • A logic bomb is a situation in which, • Software only misbehaves when particular criteria are met; • Otherwise, it functions normally. 20 Unit-4 Security and Protection Q: List out and explain program threats
  • 21. Threats Program Threats • Trap Door: • A trap door is, • When a program that is supposed to work as expected has a security weakness in its code that allows it to do illegal actions without the user's knowledge. 21 Unit-4 Security and Protection Q: List out and explain program threats
  • 22. Threats System Threats • System threats are described as the misuse of system services and network connections to cause user problems. • These threats may be used to trigger the program threats over an entire network, known as program attacks. • System threats make an environment in which OS resources and user files may be misused. • There are various system threats. Some of them are as follows. 22 Unit-4 Security and Protection Q: Define System threats
  • 23. Threats System Threats • There are various system threats. • Some of them are as follows: • Port Scanning. • Worm. • Denial of service. 23 Unit-4 Security and Protection Q: List out and explain System threats
  • 24. Threats System Threats • Port Scanning: • It is a method by which the cracker determines the system's vulnerabilities for an attack. • It is a fully automated process that includes connecting to a specific port via TCP/IP. • To protect the attacker's identity, port scanning attacks are launched through Zombie Systems. 24 Unit-4 Security and Protection Q: List out and explain System threats
  • 25. Threats System Threats • Warm: • The worm is a process that can choke a system's performance by exhausting all system resources. • A Worm process makes several clones, • Each clone consuming system resources and preventing all other processes from getting essential resources. • Worm processes can even bring a network to a halt. 25 Unit-4 Security and Protection Q: List out and explain System threats
  • 26. Threats System Threats • Denial of service: • Denial of service attacks usually prevents users from legally using the system. • For example, • If a denial-of-service attack is executed against the browser's content settings, a user may be unable to access the internet. 26 Unit-4 Security and Protection Q: List out and explain System threats
  • 27. Threats to OS • Malware. • Network intrusion. 27 Unit-4 Security and Protection
  • 28. Ensure OS security • Various ways to ensure. • Authentication. (Username/Password, Biometric, card and key) • One Time Password. (Secret key, Random number, N/w password) • Firewalls. • Physical security. 28 Unit-4 Security and Protection
  • 29. Policies and Procedure • Various policies may be implemented based on the organization. • In general, • An OS security policy is a document that specifies the procedures for ensuring that the operating system maintains a specific level of integrity, confidentiality, and availability. 29 Unit-4 Security and Protection Q: Explain Operating System security policies and procedure
  • 30. Policies and Procedure • As we know, OS Security protects systems and data from worms, malware, threats, etc. • Security policies handle all preventative activities and • Procedures to ensure an operating system's protection, including steal, edited, and deleted data. 30 Unit-4 Security and Protection Q: Explain Operating System security policies and procedure
  • 31. Policies and Procedure • As OS security policies and procedures cover a large area, there are various techniques to addressing them. • Some of them are as follows: • 1) Installing and updating anti-virus software. • 2) Ensure the systems are patched or updated regularly. 31 Unit-4 Security and Protection Q: Explain Operating System security policies and procedure
  • 32. Policies and Procedure • 3) Implementing user management policies to protect user accounts and privileges. • 4) Installing a firewall and ensuring that it is properly set to monitor all incoming and outgoing traffic. 32 Unit-4 Security and Protection Q: Explain Operating System security policies and procedure
  • 33. Protection mechanism • System protection refers to the mechanisms implemented by the operating system, • To ensure the security and integrity of the system. • It involves various techniques, • To prevent unauthorized access, misuse, or modification of the operating system and its resources. 33 Unit-4 Security and Protection
  • 34. Protection mechanism • Protection is especially important in a multiuser environment, • When multiple users use computer resources such as CPU, memory, etc. • It is the Operating system's responsibility to offer a mechanism that protects each process from other processes. 34 Unit-4 Security and Protection
  • 35. Protection mechanism • In a multiuser environment, • All assets that require protection are classified as objects, and • Those that wish to access these objects are referred to as subjects. • The OS grants different 'access rights' to different subjects. 35 Unit-4 Security and Protection
  • 36. Protection mechanism • There are several ways in which an OS can provide system protection: • User authentication. • Access Control. • Encryption. • Firewall • Antivirus Software. • System updates and patches. 36 Unit-4 Security and Protection
  • 37. System Protection • Protection refers to a mechanism which controls the access of programs, processes, or users to the resources defined by a computer system. 37 Unit-4 Security and Protection Q: Define system protection
  • 38. Need of Protection • To prevent the access of unauthorized users. • To ensure that, • Each active programs or processes in the system uses resources only as the stated policy. • To improve reliability by detecting latent errors. 38 Unit-4 Security and Protection Q: Justify need of protection mechanism in OS
  • 39. Protection Domain • Various domains of protection in OS are as follows: • Process's protected domain: • The protection policies restrict each process's access to its resource handling. • A process is allowed to use only the necessary resources with time constraints. 39 Unit-4 Security and Protection Q: Explain protection domian
  • 40. Protection Domain • Process and object: • They are abstract data types in a computer system, and • These objects have operations that are unique to them. • A domain component is defined as:. 40 Unit-4 Security and Protection Q: Explain protection domian <object, {set of operations on object}>
  • 41. Protection Domain • Collection of object: • Each domain comprises a collection of objects. • The operations may be implemented on objects. • A domain could be made up of only one process, procedure, or user. • If a domain is linked with a procedure, then changing the domain would mean changing the procedure ID. • Objects may share one or more common operations.. 41 Unit-4 Security and Protection Q: Explain protection domian
  • 42. Protection Domain • .. 42 Unit-4 Security and Protection Q: Explain protection domian
  • 44. 44