Security & Protection in Operating System

MeghajKumarMallick 630 views 14 slides Apr 13, 2020
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

This is an PPT of Operating System. It include the following topic"Security & Protection in Operating System ".


Slide Content

SECURITY AND PROTECTION IN OPERATING SYSTEM Presented By : MUSKAAN MCA/25020/18

Introduction Interference in resource utilization is a very serious threat in an OS The nature of the threat depends on the nature of a resource and the manner in which it is used.

P rote c t i o n an d S ecurity OS use two sets of techniques to counter threats to information namely: Protection Security

Protection It involves guarding a user’s data and programs against interference by other authorized users of the system.

S e c u r i ty It involves guarding of a user’s data and programs against interference by external entities, e.g. unauthorized persons.

Facets to protection of information There are two facets to protection of information Secrecy: Implies that only authorized users should be able to access information. Privacy: Implies that information should be used only for the purpose(s) for which it is intended and shared .

Security and Protection: Policies and Mechanisms Security : Specify whether a person can become a user of the system. This function is performed by the system administrator Add or delete users . Verify whether a person is an authorized user. Mechanisms : Policy: 1 . 2 .

P rotec t i o n: Policy: Mechanisms: Specify whether a user can access a specific file. The owner of a file performs this function while creating it. Set or change protection information for a file. Check whether a file can be accessed by a user. 2 . 1 .

Security Threats Direct: This is any direct attack on your specific systems, whether from outside hackers or from disgruntled insiders . Indirect: This is general random attack, most commonly computer viruses, computer worms or Trojan horses.

Reasons for taking Security measures To prevent loss of data To prevent corruption of data To prevent compromise of data TO prevent theft of data To prevent sabotage

GOALS OF SECURITY AND PROTECTION Secrecy: Only authorized user should be able to access information. Privacy: Information should be used only for the purpose for which it was intended and shared. Authenticity: It should be possible to verify the source or sender of the information and also verify the information has been preserved in the form in which it was created or sent. Integrity : It should not be possible to destroy or corrupt the information .

AUTHENTICATION Goal of Authentication: Reasonable assurance that anyone who attempts to access a system or a network is a legitimate user. 2 Mechanisms: Password Biometric measure

Authentication using Biometrics Use basic body properties to prove identity. Examples include: Fingerprints voice Hand size Retina patterns Facial features

Thank You
Tags