SlideShare a Scribd company logo
Name:- Sunipa Bera
B.Tech CSE(CSF)
Roll no:- 2
Operating System
&
Application Security
Acknowledgement
Primarily I would thank God for being able to complete
this presentation in Success. Then I would like to thank
my teacher, whose valuable guidance has been the ones
that helped me patch this presentation and make it full
proof success his suggestions and his instructions has
served as the major contributor towards the completion of
the presentation.
Then I would like to thank my parents and friends who
have helped me with their valuable suggestions and
guidance.
Operating System
○ The OS can be drawn as the life of
a computer system.
○ It runs all the programs and
applications on the computer.
○ Being the control center of the
computer, its role in the overall
security of the system is very
important.
Application Security
○ Security refers to providing a protection
system to computer system resources.
○ If a computer program is run by an
unauthorized user, then he/she may
cause severe damage to computer or data
stored in it.
Security
Authentication
One Time
passwords
System Threats
Program
Threats
Computer
Security
Classifications
Authentication
Username / Password −
User need to enter a
registered username and
password with Operating
system to login into the
system.
User card/key − User
need to punch card in
card slot, or enter key
generated by key
generator in option
provided by operating
system to login into the
system.
User attribute -
fingerprint/ eye
retina pattern/
signature − User
need to pass his/her
attribute via
designated input
device used by
operating system to
login into the system.
7
Authentication refers to identifying each user of the system and
associating the executing programs with those users.
It is the responsibility of the Operating System to create a protection
system which ensures that a user who is running a particular program
is authentic.
Random numbers −
Users are provided cards
having numbers printed
along with corresponding
alphabets. System asks
for numbers
corresponding to few
alphabets randomly
chosen.
One Time passwords
Secret key − User are
provided a hardware
device which can create a
secret id mapped with
user id. System asks for
such secret id which is to
be generated every time
prior to login.
Network password −
Some commercial
applications send one-
time passwords to user
on registered mobile/
email which is required
to be entered prior to
login.
One-time passwords provide additional security along with normal
authentication. In One-Time Password system, a unique password is
required every time user tries to login into the system. Once a one-
time password is used, then it cannot be used again.
Program Threats
Operating system's processes and kernel do the designated
task as instructed. If a user program made these process do
malicious tasks, then it is known as Program Threats.
Trojan Horse − Such
program traps user login
credentials and stores them
to send to malicious user
who can later on login to
computer and can access
system resources.
Trap Door − If a program
which is designed to work as
required, have a security hole in
its code and perform illegal
action without knowledge of
user then it is called to have a
trap door.
Logic Bomb − Logic bomb is
a situation when a program
misbehaves only when certain
conditions met otherwise it
works as a genuine program.
It is harder to detect.
Virus − Virus as name suggest can
replicate themselves on computer
system. They are highly dangerous and
can modify user files, crash systems. A
virus is generally a small code embedded
in a program. As user accesses the
program, the virus starts getting
embedded in other files and can make
system unusable for user.
System Threats
System threats refers to misuse of system services and network
connections to put user in trouble. System threats can be used to
launch program threats on a complete network called as program
attack. System threats creates such an environment that operating
system resources/ user files are misused.
Worm − Worm is a process
which can choked down a
system performance by
using system resources to
extreme levels. A Worm
process generates its
multiple copies where each
copy uses system resources,
prevents all other processes
to get required resources.
Worms processes can even
shut down an entire
network.
Port Scanning − Port
scanning is a
mechanism or means
by which a hacker can
detects system
vulnerabilities to make
an attack on the
system.
Denial of Service −
Denial of service
attacks normally
prevents user to make
legitimate use of the
system. For example, a
user may not be able to
use internet if denial of
service attacks
browser's content
settings.
Computer Security
Classifications
○ As per the U.S. Department of Defense Trusted Computer
System's Evaluation Criteria there are four security
classifications in computer systems: A, B, C, and D. This is
widely used specifications to determine and model the
security of systems and of security solutions.
Sr. no. Classification types and description
1. Type A
Highest Level. Uses formal design specifications and verification techniques.
Grants a high degree of assurance of process security.
2. Type B
Provides mandatory protection system. Have all the properties of a class C2
system. Attaches a sensitivity label to each object. It is of three types.
B1 − Maintains the security label of each object in the system. Label is used for
making decisions to access control.
B2 − Extends the sensitivity labels to each system resource, such as storage
objects, supports covert channels and auditing of events.
B3 − Allows creating lists or user groups for access-control to grant access or
revoke access to a given named object.
3. Type C
Provides protection and user accountability using audit capabilities. It is of two
types.
C1 − Incorporates controls so that users can protect their private information
and keep other users from accidentally reading / deleting their data. UNIX
versions are mostly Cl class.
C2 − Adds an individual-level access control to the capabilities of a Cl level
system.
4. Type D
Lowest level. Minimum protection. MS-DOS, Window 3.1 fall in this category.
Credits:
I extended my heartiest thanks to my friends and my mentor to
understand different principles and different judgement variables that
made this project works a success.
Thanks!
Any Questions?
Biblography
- Reference book
- Online sites:
- - geeksforgeeks
- - tutorialspoint
15

More Related Content

PPTX
system Security
PPT
Windows Security in Operating System
PPT
Computer viruses
PPTX
Operating System Security
PPTX
Security in Windows operating system
PPTX
Security and protection
PPT
Int 2 software slides 2010
PDF
OPERATING SYSTEM SECURITY
system Security
Windows Security in Operating System
Computer viruses
Operating System Security
Security in Windows operating system
Security and protection
Int 2 software slides 2010
OPERATING SYSTEM SECURITY

What's hot (20)

PPTX
Security & Protection in Operating System
PPTX
Operating system security
PPT
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
PPTX
System security
PDF
Operating systems security 2007 vulnerability report
PPTX
Operating system security
PPTX
Security
PPTX
Program Threats
PPTX
Computer virus
PPTX
Os security issues
PPTX
Security & protection in operating system
PPT
Trojan horse nitish nagar
PPTX
Utility software
PPTX
Protection and security of operating system
PPTX
System security
PPTX
Utility programs
PPTX
System security by Amin Pathan
PPTX
Protection and security
PPT
Protection and Security in Operating Systems
PPTX
Malware Defense-in-Depth 2.0
Security & Protection in Operating System
Operating system security
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
System security
Operating systems security 2007 vulnerability report
Operating system security
Security
Program Threats
Computer virus
Os security issues
Security & protection in operating system
Trojan horse nitish nagar
Utility software
Protection and security of operating system
System security
Utility programs
System security by Amin Pathan
Protection and security
Protection and Security in Operating Systems
Malware Defense-in-Depth 2.0
Ad

Similar to Operating System & Application Security (20)

PDF
Ch14 security
PPTX
System Security Sem 2(Module 1).pptx
PPT
Ch19 OS
 
PPT
ODP
CISSP Week 14
PPT
Information Security Audit and Analysis Module
PPT
3. security architecture and models
PPT
3 securityarchitectureandmodels-120331064706-phpapp01
DOCX
Reference Article1st published in May 2015doi 10.1049etr.docx
PPTX
Security & threats Presentation => (Presenter: Komal Mehfooz)
PPTX
Communication security
PDF
Cyber security
PPTX
CHAPTER 7 - Operating system Security.pptx
PPT
Software security
PPTX
Survey of file protection techniques
PDF
Secure codingguide
PPTX
Tyepes of operating Module 4 chapter .pptx
PPTX
Protection in general purpose operating system
PDF
<marquee>html title testfsdjk34254</marquee>
Ch14 security
System Security Sem 2(Module 1).pptx
Ch19 OS
 
CISSP Week 14
Information Security Audit and Analysis Module
3. security architecture and models
3 securityarchitectureandmodels-120331064706-phpapp01
Reference Article1st published in May 2015doi 10.1049etr.docx
Security & threats Presentation => (Presenter: Komal Mehfooz)
Communication security
Cyber security
CHAPTER 7 - Operating system Security.pptx
Software security
Survey of file protection techniques
Secure codingguide
Tyepes of operating Module 4 chapter .pptx
Protection in general purpose operating system
<marquee>html title testfsdjk34254</marquee>
Ad

More from Sunipa Bera (19)

PPTX
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
PPTX
Ds stack & queue
PPTX
System tThreats
PPTX
Constructor and Destructor
PPTX
Proposition & Logical Operations
PPTX
Integral Calculas
PPTX
Basic concept of Engineering Mechanics
PPTX
Biogeographical zones of India
PPTX
Inflation
PPTX
Types of Ecosystem
PPTX
Elementary transformation
PPTX
Emotional Intelligence
PPTX
SKYDRIVE
PPTX
7 cs of effective communication
PPTX
Basics of microprocessor
PPTX
Functioning of computer
PPTX
INDIAN ISLAND STUDIES
PPTX
GO GREEN - GO ECOFRIENDLY
PPTX
INDIA AND HERITAGE
Understanding Hackers: Types, Techniques, and Prevention Strategies.pptx
Ds stack & queue
System tThreats
Constructor and Destructor
Proposition & Logical Operations
Integral Calculas
Basic concept of Engineering Mechanics
Biogeographical zones of India
Inflation
Types of Ecosystem
Elementary transformation
Emotional Intelligence
SKYDRIVE
7 cs of effective communication
Basics of microprocessor
Functioning of computer
INDIAN ISLAND STUDIES
GO GREEN - GO ECOFRIENDLY
INDIA AND HERITAGE

Recently uploaded (20)

PPTX
Institutional Correction lecture only . . .
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Cell Types and Its function , kingdom of life
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Business Ethics Teaching Materials for college
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Institutional Correction lecture only . . .
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
STATICS OF THE RIGID BODIES Hibbelers.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Cell Types and Its function , kingdom of life
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPH.pptx obstetrics and gynecology in nursing
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial diseases, their pathogenesis and prophylaxis
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Business Ethics Teaching Materials for college
2.FourierTransform-ShortQuestionswithAnswers.pdf
Cell Structure & Organelles in detailed.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
TR - Agricultural Crops Production NC III.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table

Operating System & Application Security

  • 1. Name:- Sunipa Bera B.Tech CSE(CSF) Roll no:- 2
  • 3. Acknowledgement Primarily I would thank God for being able to complete this presentation in Success. Then I would like to thank my teacher, whose valuable guidance has been the ones that helped me patch this presentation and make it full proof success his suggestions and his instructions has served as the major contributor towards the completion of the presentation. Then I would like to thank my parents and friends who have helped me with their valuable suggestions and guidance.
  • 4. Operating System ○ The OS can be drawn as the life of a computer system. ○ It runs all the programs and applications on the computer. ○ Being the control center of the computer, its role in the overall security of the system is very important.
  • 5. Application Security ○ Security refers to providing a protection system to computer system resources. ○ If a computer program is run by an unauthorized user, then he/she may cause severe damage to computer or data stored in it.
  • 7. Authentication Username / Password − User need to enter a registered username and password with Operating system to login into the system. User card/key − User need to punch card in card slot, or enter key generated by key generator in option provided by operating system to login into the system. User attribute - fingerprint/ eye retina pattern/ signature − User need to pass his/her attribute via designated input device used by operating system to login into the system. 7 Authentication refers to identifying each user of the system and associating the executing programs with those users. It is the responsibility of the Operating System to create a protection system which ensures that a user who is running a particular program is authentic.
  • 8. Random numbers − Users are provided cards having numbers printed along with corresponding alphabets. System asks for numbers corresponding to few alphabets randomly chosen. One Time passwords Secret key − User are provided a hardware device which can create a secret id mapped with user id. System asks for such secret id which is to be generated every time prior to login. Network password − Some commercial applications send one- time passwords to user on registered mobile/ email which is required to be entered prior to login. One-time passwords provide additional security along with normal authentication. In One-Time Password system, a unique password is required every time user tries to login into the system. Once a one- time password is used, then it cannot be used again.
  • 9. Program Threats Operating system's processes and kernel do the designated task as instructed. If a user program made these process do malicious tasks, then it is known as Program Threats. Trojan Horse − Such program traps user login credentials and stores them to send to malicious user who can later on login to computer and can access system resources. Trap Door − If a program which is designed to work as required, have a security hole in its code and perform illegal action without knowledge of user then it is called to have a trap door. Logic Bomb − Logic bomb is a situation when a program misbehaves only when certain conditions met otherwise it works as a genuine program. It is harder to detect. Virus − Virus as name suggest can replicate themselves on computer system. They are highly dangerous and can modify user files, crash systems. A virus is generally a small code embedded in a program. As user accesses the program, the virus starts getting embedded in other files and can make system unusable for user.
  • 10. System Threats System threats refers to misuse of system services and network connections to put user in trouble. System threats can be used to launch program threats on a complete network called as program attack. System threats creates such an environment that operating system resources/ user files are misused. Worm − Worm is a process which can choked down a system performance by using system resources to extreme levels. A Worm process generates its multiple copies where each copy uses system resources, prevents all other processes to get required resources. Worms processes can even shut down an entire network. Port Scanning − Port scanning is a mechanism or means by which a hacker can detects system vulnerabilities to make an attack on the system. Denial of Service − Denial of service attacks normally prevents user to make legitimate use of the system. For example, a user may not be able to use internet if denial of service attacks browser's content settings.
  • 11. Computer Security Classifications ○ As per the U.S. Department of Defense Trusted Computer System's Evaluation Criteria there are four security classifications in computer systems: A, B, C, and D. This is widely used specifications to determine and model the security of systems and of security solutions.
  • 12. Sr. no. Classification types and description 1. Type A Highest Level. Uses formal design specifications and verification techniques. Grants a high degree of assurance of process security. 2. Type B Provides mandatory protection system. Have all the properties of a class C2 system. Attaches a sensitivity label to each object. It is of three types. B1 − Maintains the security label of each object in the system. Label is used for making decisions to access control. B2 − Extends the sensitivity labels to each system resource, such as storage objects, supports covert channels and auditing of events. B3 − Allows creating lists or user groups for access-control to grant access or revoke access to a given named object. 3. Type C Provides protection and user accountability using audit capabilities. It is of two types. C1 − Incorporates controls so that users can protect their private information and keep other users from accidentally reading / deleting their data. UNIX versions are mostly Cl class. C2 − Adds an individual-level access control to the capabilities of a Cl level system. 4. Type D Lowest level. Minimum protection. MS-DOS, Window 3.1 fall in this category.
  • 13. Credits: I extended my heartiest thanks to my friends and my mentor to understand different principles and different judgement variables that made this project works a success.
  • 15. Biblography - Reference book - Online sites: - - geeksforgeeks - - tutorialspoint 15