SlideShare a Scribd company logo
2
Most read
7
Most read
16
Most read
Protection and
Security in OS
V.V.SUBRAHMANYAM
SOCIS, IGNOU
DATE: 28-10-07
TIME: 16-30 TO 17-00
Introduction
 Interference in resource utilization is a
very serious threat in an OS
 The nature of the threat depends on the
nature of a resource and the manner in
which it is used.
 In this session, we discuss threats to
information stored in files because they
are the most common, and also the
most complex, threats.
Protection and Security
 OS use two sets of techniques to
counter threats to information namely:
Protection
Security
Protection
 It involves guarding a user’s data and
programs against interference by other
authorized users of the system.
Security
 It involves guarding of a user’s data
and programs against interference by
external entities, e.g. unauthorized
persons.
Facets to protection of information
 There are two facets to protection of
information
Secrecy: Implies that only authorized users
should be able to access information.
Privacy: Implies that information should be
used only for the purpose(s) for which it is
intended and shared.
OS focuses on guaranteeing secrecy of
information , and leaves the issue of privacy
to the users and their processes.
Security and Protection: Policies and Mechanisms
Security Policy Specify whether a person can
become a user of the system.
This function is performed by
the system administrator
Mechanisms 1. Add or delete users
2. Verify whether a person
is an authorized user.
Protection Policy Specify whether a user can
access a specific file. The
owner of a file performs this
function while creating it.
Mechanisms 1. Set or change
protection information
for a file.
2. Check whether a file
can be accessed by a
user.
Security Attributes
 Security is traditionally defined by the
three attributes namely:
Confidentiality: It is the prevention of
unauthorized modification of information or
resources.
Integrity: It is the prevention of unauthorized
Availability: It is the prevention of
unauthorized withholding of information or
resources.
Security Threats
 Direct: This is any direct attack on your
specific systems, whether from outside
hackers or from disgruntled insiders.
 Indirect: This is general random attack,
most commonly computer viruses,
computer worms or Trojan horses.
Reasons for taking Security measures
 To prevent loss of data
 To prevent corruption of data
 To prevent compromise of data
 TO prevent theft of data
 To prevent sabotage
Authentication
 Goal of Authentication: Reasonable
assurance that anyone who attempts
to access a system or a network is a
legitimate user.
 3 Mechanisms:
Password
Physical token or an artifact
Biometric measure
Security Models
 Security models can be discretionary or
mandatory.
Discretionary: Holders of right can be
allowed to transfer them at their discretion.
Mandatory: Only designated roles are
allowed to grant rights and users cannot
transfer them.
Security policy Vs. Security Model
 Security Policy: Outlines several high
level points: how the data is accessed, the
amount of security required and what are
the steps when these requirements are
not met.
 Security Model: The mechanism to
support the security policy. This involves
in the design of the security system.
Access Matrix Model
 Consists three principal components:
A set of passive objects (files, terminals,
devices and other entities)
A set of active subjects, which may be
manipulate the objects
A set of rules governing the manipulation
of objects by subjects.
The access matrix is a rectangular array
with one row per subject and one column
per object.
Objects
Subjects
File 1 File 2 File 3
User 1 r,w r r,w,x
User 2 r r r,w,x
User 3 r,w,x r,w r,w,x
Role Based Access Control
 Enforces access controls depending upon
a user role(s).
 Roles represent specific organization
duties and are commonly mapped to job
title. Ex: Administrator, Developer etc.
 Role definitions and associated access
rights must be based upon a thorough
understanding of an organization’s
security policy.
Take-Grant Model
 This model use graphs to model access
control.
 The graph structure can be represented as an
adjacency matrix and labels on the arcs can
be coded as different values in the matrix.
 Nodes in the graph are of two types, one
corresponding to subjects and the other to
objects.
 The possible access rights are read( r),
write(w), take(t) and grant(g).
Example of Take
Example of Grant
Multilevel Models
 This type of models corresponds to the
multilevel policies where data is classified
into sensitivity levels and users have
access according to their clearances.
 Also known as Data Flow Models.
Contd…
 The Bell-La Padula model, intended to
contral leakage of information between
levels.
 The Biba Model, which controls the
integrity.
 The Lattice Model, which generalizes the
partially ordered levels of the previous
models using the concept of mathematical
lattices.
Thank You

More Related Content

PPTX
Security & protection in operating system
PDF
OPERATING SYSTEM SECURITY
PPTX
Operating system security
PPTX
Protection and security of operating system
PPT
Design for security in operating system
PPTX
file system in operating system
PPTX
Operating System Security
Security & protection in operating system
OPERATING SYSTEM SECURITY
Operating system security
Protection and security of operating system
Design for security in operating system
file system in operating system
Operating System Security

What's hot (20)

PPTX
Protection and security
PPTX
Program Threats
PPTX
File system Os
PPTX
Deadlock ppt
PPTX
Active and Passive Network Attacks
PPTX
OSI Model - Open Systems Interconnection
PDF
Processes description and process control.
PPTX
Wireless network security
PPTX
File system structure
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Storage management in operating system
PPTX
8 queens problem using back tracking
PPTX
Software Configuration Management (SCM)
PDF
Information Security Lecture Notes
PPTX
Deadlock Prevention
PPTX
Introduction to Parallel and Distributed Computing
PDF
Memory management
PDF
OS - Process Concepts
PDF
Disk allocation methods
PPTX
CS8792 - Cryptography and Network Security
Protection and security
Program Threats
File system Os
Deadlock ppt
Active and Passive Network Attacks
OSI Model - Open Systems Interconnection
Processes description and process control.
Wireless network security
File system structure
Network security (vulnerabilities, threats, and attacks)
Storage management in operating system
8 queens problem using back tracking
Software Configuration Management (SCM)
Information Security Lecture Notes
Deadlock Prevention
Introduction to Parallel and Distributed Computing
Memory management
OS - Process Concepts
Disk allocation methods
CS8792 - Cryptography and Network Security
Ad

Similar to Protection and Security in Operating Systems (20)

PPTX
Security & Protection in Operating System
PPTX
operating system ppt tegeng2.pptxguktgjh
PPTX
resource security and protection in distributed system
PPT
Chapter 5-Security Mechanisms and Techniques.ppt
PPT
Ch1 cse
PDF
Information Security basic introduction by professor
PDF
CSI-503 - 10. Security & Protection (Operating System)
PDF
Chapter 1 - Introduction.pdf
PDF
Health Information Privacy and Security
PPT
Chapter Last.ppt
PPTX
Security Environment, Design Principles Of Security
PPTX
securityandprotection Design Principles Of Security
PPT
AccessControl.ppt
PPTX
Week Topic Code Access vs Event Based.pptx
PPT
4_5949547032388570388.ppt
PDF
Distributed Operating System Resource Security And Protection: Access and Flo...
PPTX
Protection Domain and Access Matrix Model -Operating System
PPTX
Protection in general purpose operating system
PDF
Health Information Privacy and Security
PPT
Access control3
Security & Protection in Operating System
operating system ppt tegeng2.pptxguktgjh
resource security and protection in distributed system
Chapter 5-Security Mechanisms and Techniques.ppt
Ch1 cse
Information Security basic introduction by professor
CSI-503 - 10. Security & Protection (Operating System)
Chapter 1 - Introduction.pdf
Health Information Privacy and Security
Chapter Last.ppt
Security Environment, Design Principles Of Security
securityandprotection Design Principles Of Security
AccessControl.ppt
Week Topic Code Access vs Event Based.pptx
4_5949547032388570388.ppt
Distributed Operating System Resource Security And Protection: Access and Flo...
Protection Domain and Access Matrix Model -Operating System
Protection in general purpose operating system
Health Information Privacy and Security
Access control3
Ad

More from vampugani (19)

PPTX
Social media presentation
PPTX
Creating Quick Response(QR) Codes for the OER
PPTX
Arithmetic Computation using 2's Complement Notation
PPTX
Post Graduate Diploma in Computer Applications (PGDCA)
PPTX
Overview of Distributed Systems
PPT
Virtual Memory
PPT
Memory Management in OS
PPT
Process Scheduling
PPT
Processes
PPT
Introduction to OS
PPT
Operating Systems
PPT
Distributed Systems
PPT
Multiprocessor Systems
PPT
File Management in Operating Systems
PPT
Strings in c
PPT
Arrays in c
PPT
Control statements and functions in c
PPT
Introduction to C Programming
PPT
Introduction to C Programming - I
Social media presentation
Creating Quick Response(QR) Codes for the OER
Arithmetic Computation using 2's Complement Notation
Post Graduate Diploma in Computer Applications (PGDCA)
Overview of Distributed Systems
Virtual Memory
Memory Management in OS
Process Scheduling
Processes
Introduction to OS
Operating Systems
Distributed Systems
Multiprocessor Systems
File Management in Operating Systems
Strings in c
Arrays in c
Control statements and functions in c
Introduction to C Programming
Introduction to C Programming - I

Recently uploaded (20)

PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
Cell Structure & Organelles in detailed.
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Classroom Observation Tools for Teachers
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Basic Mud Logging Guide for educational purpose
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
human mycosis Human fungal infections are called human mycosis..pptx
Microbial disease of the cardiovascular and lymphatic systems
01-Introduction-to-Information-Management.pdf
Cell Types and Its function , kingdom of life
Cell Structure & Organelles in detailed.
Week 4 Term 3 Study Techniques revisited.pptx
Supply Chain Operations Speaking Notes -ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Classroom Observation Tools for Teachers
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Pharma ospi slides which help in ospi learning
VCE English Exam - Section C Student Revision Booklet
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Final Presentation General Medicine 03-08-2024.pptx
O7-L3 Supply Chain Operations - ICLT Program
Basic Mud Logging Guide for educational purpose
Anesthesia in Laparoscopic Surgery in India
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table

Protection and Security in Operating Systems

  • 1. Protection and Security in OS V.V.SUBRAHMANYAM SOCIS, IGNOU DATE: 28-10-07 TIME: 16-30 TO 17-00
  • 2. Introduction  Interference in resource utilization is a very serious threat in an OS  The nature of the threat depends on the nature of a resource and the manner in which it is used.  In this session, we discuss threats to information stored in files because they are the most common, and also the most complex, threats.
  • 3. Protection and Security  OS use two sets of techniques to counter threats to information namely: Protection Security
  • 4. Protection  It involves guarding a user’s data and programs against interference by other authorized users of the system.
  • 5. Security  It involves guarding of a user’s data and programs against interference by external entities, e.g. unauthorized persons.
  • 6. Facets to protection of information  There are two facets to protection of information Secrecy: Implies that only authorized users should be able to access information. Privacy: Implies that information should be used only for the purpose(s) for which it is intended and shared. OS focuses on guaranteeing secrecy of information , and leaves the issue of privacy to the users and their processes.
  • 7. Security and Protection: Policies and Mechanisms Security Policy Specify whether a person can become a user of the system. This function is performed by the system administrator Mechanisms 1. Add or delete users 2. Verify whether a person is an authorized user. Protection Policy Specify whether a user can access a specific file. The owner of a file performs this function while creating it. Mechanisms 1. Set or change protection information for a file. 2. Check whether a file can be accessed by a user.
  • 8. Security Attributes  Security is traditionally defined by the three attributes namely: Confidentiality: It is the prevention of unauthorized modification of information or resources. Integrity: It is the prevention of unauthorized Availability: It is the prevention of unauthorized withholding of information or resources.
  • 9. Security Threats  Direct: This is any direct attack on your specific systems, whether from outside hackers or from disgruntled insiders.  Indirect: This is general random attack, most commonly computer viruses, computer worms or Trojan horses.
  • 10. Reasons for taking Security measures  To prevent loss of data  To prevent corruption of data  To prevent compromise of data  TO prevent theft of data  To prevent sabotage
  • 11. Authentication  Goal of Authentication: Reasonable assurance that anyone who attempts to access a system or a network is a legitimate user.  3 Mechanisms: Password Physical token or an artifact Biometric measure
  • 12. Security Models  Security models can be discretionary or mandatory. Discretionary: Holders of right can be allowed to transfer them at their discretion. Mandatory: Only designated roles are allowed to grant rights and users cannot transfer them.
  • 13. Security policy Vs. Security Model  Security Policy: Outlines several high level points: how the data is accessed, the amount of security required and what are the steps when these requirements are not met.  Security Model: The mechanism to support the security policy. This involves in the design of the security system.
  • 14. Access Matrix Model  Consists three principal components: A set of passive objects (files, terminals, devices and other entities) A set of active subjects, which may be manipulate the objects A set of rules governing the manipulation of objects by subjects.
  • 15. The access matrix is a rectangular array with one row per subject and one column per object. Objects Subjects File 1 File 2 File 3 User 1 r,w r r,w,x User 2 r r r,w,x User 3 r,w,x r,w r,w,x
  • 16. Role Based Access Control  Enforces access controls depending upon a user role(s).  Roles represent specific organization duties and are commonly mapped to job title. Ex: Administrator, Developer etc.  Role definitions and associated access rights must be based upon a thorough understanding of an organization’s security policy.
  • 17. Take-Grant Model  This model use graphs to model access control.  The graph structure can be represented as an adjacency matrix and labels on the arcs can be coded as different values in the matrix.  Nodes in the graph are of two types, one corresponding to subjects and the other to objects.  The possible access rights are read( r), write(w), take(t) and grant(g).
  • 20. Multilevel Models  This type of models corresponds to the multilevel policies where data is classified into sensitivity levels and users have access according to their clearances.  Also known as Data Flow Models.
  • 21. Contd…  The Bell-La Padula model, intended to contral leakage of information between levels.  The Biba Model, which controls the integrity.  The Lattice Model, which generalizes the partially ordered levels of the previous models using the concept of mathematical lattices.