SlideShare a Scribd company logo
Operating system
A system having basic kernel functions of process
and memory management ,file, i/o device and
network management functions and many other
functions.
Protection of memory and resources from any
unauthorized into the PCB or resource ,or mix up of
access of one by another becomes imperative.
Introduction to OS security
issues
 The OS security issue is a critical issue.
 Each process determines whether it has a control
of a system resoure exclusively or whether it is
isolated from the other processes or whether it
shares a resource common to a set of processes.
 The OS then configures when a resource is
isolated from from one process and a resource is
shared with a defined with a define set of
processes.
 The OS should also have the flexibility to change
this configuration when needed, to full fill the
requirements all the process.
 For example, a process has 32 memory blocks at
an instance and the OS configures the system
accordingly.
 The OS should provide protection mechanism
and implement a system administration(s) –
defined security policy.
 An application software programmer can find a
hole in the protection mechanism and an
unauthorized access.
Important security issues
 Protection mechanism
 Flexibility to of change.
Control resource sharing
 Confinement mechanism
 Security policy (strategy).
 Authentication mechanism.
 Authorization.
 Encryption
Protection Mechanism
 OS should provide protection mechanisms
and implement a system administrator (s)
defined security
Flexibility to of change
 when needed to fulfill the need
requirements of all the processes.
 For example, a process has control of 32
memory blocks at an instance and the OS
configured the system accordingly. t
 Later when more processes are created, this
can be reconfigured.
Controlled resource sharing
 Controlling read and write of the resources
and parameters by user processes.
 For example, some resources write only for
a process and some read only for a set of
processes
 Another example, memory buffer to which
one process writes at an instant till that
buffer is emptied by other process
Confinement Mechanism
 Mechanism that restricts sharing of
parameters to a set of processes only .
Security Policy (Strategy)
 Rules for authorizing access to the OS,
system and information.
 A policy example is that a communication
system may having a policy of peer-to-peer
communication (connection establishment
preceding the data packets flow).
Authentication Mechanism
 External authentication mechanism for the user
and a mechanism meant to prevent an
application run unless the user registers and the
system administrator (software) authorizes
 Internal authentication for the process, and the
process should not appear (impersonate) as some
like other processes.
 User authentication can become difficult if the
user disseminates password passwords or other
authentication methods
Authorization
 User or process (s) allowed to use the
system resources as per the security policy
Encryption
 A tool to change information to make it
unusable by any other user or process unless
without the appropriate key is used for
deciphering it.
CONCLUSION
 OS security issues are important
considerations.
 Protection of memory and resources from
any unauthorized and without explicit
authorization write into the PCB or
resource
 Mix up of accesses of one by
another, becomes imperative from an OS
security and protection mechanism
Os security issues

More Related Content

PPTX
Deployment Models of Cloud Computing.pptx
PPT
Protection and Security in Operating Systems
PPTX
File allocation methods (1)
PPT
Distributed File Systems
PPTX
File system Os
PPTX
File system structure
PPTX
Program Threats
PPT
Deployment Models of Cloud Computing.pptx
Protection and Security in Operating Systems
File allocation methods (1)
Distributed File Systems
File system Os
File system structure
Program Threats

What's hot (20)

PPTX
Wireshark Basic Presentation
PPTX
File systems versus a dbms
PPTX
8 queens problem using back tracking
PPTX
SCHEDULING ALGORITHMS
PPTX
Distribution transparency and Distributed transaction
PPTX
Kernel I/O subsystem
PDF
CS8791 Cloud Computing - Question Bank
PPTX
Security & protection in operating system
PPTX
Heap Management
PPT
Presentation On RAID(Redundant Array Of Independent Disks) Basics
PPTX
Cloud operating system
PDF
Memory management
PPTX
Protection and security
PPTX
Public Key Cryptography
PPTX
File Management in Operating System
PPTX
System security
PPT
Memory Management in OS
PPTX
Storage management in operating system
PPTX
Program security
PPTX
Operating System Security
Wireshark Basic Presentation
File systems versus a dbms
8 queens problem using back tracking
SCHEDULING ALGORITHMS
Distribution transparency and Distributed transaction
Kernel I/O subsystem
CS8791 Cloud Computing - Question Bank
Security & protection in operating system
Heap Management
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Cloud operating system
Memory management
Protection and security
Public Key Cryptography
File Management in Operating System
System security
Memory Management in OS
Storage management in operating system
Program security
Operating System Security
Ad

Similar to Os security issues (20)

PPTX
Security issues in os
PPT
OS Security 2009
PPTX
System Security Sem 2(Module 1).pptx
PPT
Chap 4-protection_in_general purpose_Operating System.ppt
PPTX
Operating Systems R20 Unit 1.pptx
PPT
Chapter Last.ppt
PPTX
Operating System Introduction
PPT
protection in general-purpose_OS.ppt
PPT
ch3 - operating system structures.ppt
PDF
CSI-503 - 10. Security & Protection (Operating System)
PPT
OS Database Security Chapter 6
PPTX
2. Operating System Structure,Services,Call, Design and Implementation.pptx
PPTX
input and output protection.pptx
PPTX
Operating systems introduction
PPTX
installing and optimizing operating system software
PPTX
PPTX
ppt of features of operating system.pptx
PPTX
Ch2_OS_Lecture 3.pptx
PDF
chapter 3 opreating system lecture note and its is impaortamt concept for mn
PPTX
Unit 1-Operating Systems Overview .pptx
Security issues in os
OS Security 2009
System Security Sem 2(Module 1).pptx
Chap 4-protection_in_general purpose_Operating System.ppt
Operating Systems R20 Unit 1.pptx
Chapter Last.ppt
Operating System Introduction
protection in general-purpose_OS.ppt
ch3 - operating system structures.ppt
CSI-503 - 10. Security & Protection (Operating System)
OS Database Security Chapter 6
2. Operating System Structure,Services,Call, Design and Implementation.pptx
input and output protection.pptx
Operating systems introduction
installing and optimizing operating system software
ppt of features of operating system.pptx
Ch2_OS_Lecture 3.pptx
chapter 3 opreating system lecture note and its is impaortamt concept for mn
Unit 1-Operating Systems Overview .pptx
Ad

More from JOLLUSUDARSHANREDDY (20)

PPTX
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
PPTX
MEMORY MANAGEMENT
PPTX
Basic functions & types of RTOS ES
PPTX
RTOS LINUX2.6.X & LINUX2.6.24
PPT
OSEK / VDX
PPTX
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
PPTX
INTERRUPT LATENCY AND RESPONSE OF THE TASK
PPTX
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
PPT
Rt linux-lab1
PPTX
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
PPTX
PPTX
Automated system for fault analysis in industries using
PPTX
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
PPTX
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
PPTX
Zigbee Based Solar Light System By Using LDR
PPTX
Design of smart nodes for wireless sensor network ...
PPTX
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
PPTX
BOMB DETECTION ROBOT BY USING GSM & GPS
PPTX
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
PPTX
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
MEMORY MANAGEMENT
Basic functions & types of RTOS ES
RTOS LINUX2.6.X & LINUX2.6.24
OSEK / VDX
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
INTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
Rt linux-lab1
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
Automated system for fault analysis in industries using
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
Zigbee Based Solar Light System By Using LDR
Design of smart nodes for wireless sensor network ...
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
BOMB DETECTION ROBOT BY USING GSM & GPS
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
SOLAR BASED MOBILE CHARGER IN RURAL AREAS

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PDF
Classroom Observation Tools for Teachers
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Pharma ospi slides which help in ospi learning
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
master seminar digital applications in india
PDF
Pre independence Education in Inndia.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
Basic Mud Logging Guide for educational purpose
Classroom Observation Tools for Teachers
VCE English Exam - Section C Student Revision Booklet
Renaissance Architecture: A Journey from Faith to Humanism
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Complications of Minimal Access Surgery at WLH
Supply Chain Operations Speaking Notes -ICLT Program
human mycosis Human fungal infections are called human mycosis..pptx
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Pharma ospi slides which help in ospi learning
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
01-Introduction-to-Information-Management.pdf
Final Presentation General Medicine 03-08-2024.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
master seminar digital applications in india
Pre independence Education in Inndia.pdf
PPH.pptx obstetrics and gynecology in nursing
Week 4 Term 3 Study Techniques revisited.pptx

Os security issues

  • 1. Operating system A system having basic kernel functions of process and memory management ,file, i/o device and network management functions and many other functions. Protection of memory and resources from any unauthorized into the PCB or resource ,or mix up of access of one by another becomes imperative.
  • 2. Introduction to OS security issues  The OS security issue is a critical issue.  Each process determines whether it has a control of a system resoure exclusively or whether it is isolated from the other processes or whether it shares a resource common to a set of processes.  The OS then configures when a resource is isolated from from one process and a resource is shared with a defined with a define set of processes.
  • 3.  The OS should also have the flexibility to change this configuration when needed, to full fill the requirements all the process.  For example, a process has 32 memory blocks at an instance and the OS configures the system accordingly.  The OS should provide protection mechanism and implement a system administration(s) – defined security policy.  An application software programmer can find a hole in the protection mechanism and an unauthorized access.
  • 4. Important security issues  Protection mechanism  Flexibility to of change. Control resource sharing  Confinement mechanism  Security policy (strategy).  Authentication mechanism.  Authorization.  Encryption
  • 5. Protection Mechanism  OS should provide protection mechanisms and implement a system administrator (s) defined security
  • 6. Flexibility to of change  when needed to fulfill the need requirements of all the processes.  For example, a process has control of 32 memory blocks at an instance and the OS configured the system accordingly. t  Later when more processes are created, this can be reconfigured.
  • 7. Controlled resource sharing  Controlling read and write of the resources and parameters by user processes.  For example, some resources write only for a process and some read only for a set of processes  Another example, memory buffer to which one process writes at an instant till that buffer is emptied by other process
  • 8. Confinement Mechanism  Mechanism that restricts sharing of parameters to a set of processes only .
  • 9. Security Policy (Strategy)  Rules for authorizing access to the OS, system and information.  A policy example is that a communication system may having a policy of peer-to-peer communication (connection establishment preceding the data packets flow).
  • 10. Authentication Mechanism  External authentication mechanism for the user and a mechanism meant to prevent an application run unless the user registers and the system administrator (software) authorizes  Internal authentication for the process, and the process should not appear (impersonate) as some like other processes.  User authentication can become difficult if the user disseminates password passwords or other authentication methods
  • 11. Authorization  User or process (s) allowed to use the system resources as per the security policy
  • 12. Encryption  A tool to change information to make it unusable by any other user or process unless without the appropriate key is used for deciphering it.
  • 13. CONCLUSION  OS security issues are important considerations.  Protection of memory and resources from any unauthorized and without explicit authorization write into the PCB or resource  Mix up of accesses of one by another, becomes imperative from an OS security and protection mechanism