Protection & Security

   Organized By: V.A.




                          V.A.
                        CSED,TU
Disclaimer


  This is NOT A COPYRIGHT           MATERIAL

Content has been taken mainly from the following books:
   Operating Systems Concepts By Silberschatz & Galvin ,
          Operating systems By D M Dhamdhere,
          System Programming By John J Donovan
                         etc…




               VA.
               CSED,TU
Protection – Goals & Principle
    Each Object has a Unique Name and can be accessed through a well-defined set
     of Operations.


    Ensure that each Object is accessed correctly and only by those Processes that
     are allowed to do so.



    Guiding Principle – Principle of Least Privilege
       Programs, users and systems should be given just enough privileges to
         perform their tasks




                            VA.
                            CSED,TU
Domain Structure
    Access-right = <object-name, rights-set>
     where rights-set is a subset of all valid operations that can be performed on the
     object.

    Domain = Set of Access-Rights


    Domain can be realized in variety of ways: Each User, Each Process and Each
     Procedure.




                             VA.
                             CSED,TU
Access Matrix
    View Protection as a MATRIX (access matrix)



    Rows represent Domains



    Columns represent Objects



    Access (i, j) is the Set Of Operations that a process executing in
     Domaini can invoke on Objectj


                           VA.
                           CSED,TU
Access Control Matrix
    Access control matrix consists of triple parts such as subject, object, and access
     operation.

    A SUBJECT is an Active Entity in a computer system such as User, Program,
     Process and Thread.

    An OBJECT is a Passive Entity or System Resource such as File, Directory,
     Database Record and Printer.

    In Access Control Matrix’s schema, the Subjects and Objects are placed in a
     table. Each row represents a Subject and each column represents an Object.

    The data inside the table are Set Of Access Operations such as read, write, and
     execute. The access operations are responsible for interactions between subjects
     and objects.

                             VA.
                             CSED,TU
Access Matrix




           VA.
           CSED,TU
Use of Access Matrix
    If a Process in Domain Di tries to do “op” on object Oj, then “op” must be in the
     ACCESS MATRIX.

    Can be Expanded to DYNAMIC PROTECTION.

         Operations to ADD, DELETE access rights.
         Special Access Rights:

              Owner of Oi
              Copy op from Oi to Oj
              Control – Di can modify Dj access rights
              Transfer – Switch from domain Di to Dj



                             VA.
                             CSED,TU
Access Matrix – Showing Switch




           VA.
           CSED,TU
Role Based Access Control




           VA.
           CSED,TU
Sample Access Matrix




 The Derivative forms of access control matrix such as Access Control List (ACL)
 and Capability List (C-list) are better applied.




                            VA.
                            CSED,TU
Access Control List




            VA.
            CSED,TU
ACL




  When we look for Insurance Data we can write:




                       VA.
                       CSED,TU
C-List




         VA.
         CSED,TU
C-List




  When we look for Alice’s C-list we can write:




                          VA.
                          CSED,TU
ACL vs CL




            VA.
            CSED,TU
Security
    Security must consider External Environment of the System and protect
     the system resources

    Intruders (crackers) attempt to breach security

    THREAT is potential security violation

    ATTACK is attempt to breach security

    Attack can be accidental or malicious

    Easier to protect against accidental than malicious misuse
                          VA.
                          CSED,TU
Security Violations
    Categories

         Breach of confidentiality
         Breach of integrity
         Breach of availability
         Theft of service
         Denial of service

    Methods

         Masquerading (breach authentication)
         Replay attack
            Message modification
         Man-in-the-middle attack
         Session hijacking

                             VA.
                             CSED,TU
Security Attacks




            VA.
            CSED,TU
Reference List


Operating Systems Concepts By Silberschatz & Galvin,
       Operating systems By D M Dhamdhere,
      System Programming By John J Donovan,

                    www.os-book.com
    www.cs.jhu.edu/~yairamir/cs418/os2/sld001.htm
http://gaia.ecs.csus.edu/~zhangd/oscal/pscheduling.html
  http://www.edugrid.ac.in/iiitmk/os/os_module03.htm
     http://williamstallings.com/OS/Animations.html
                        etc…


             VA.
             CSED,TU
Thnx…



VA.
CSED,TU

More Related Content

PPT
Process Synchronization
PPT
4 java - decision
PPT
Uta005 lecture1
PPT
2 java - operators
PPT
1 java - data type
PPT
6 java - loop
PDF
Search engine and web crawler
PPT
3 java - variable type
Process Synchronization
4 java - decision
Uta005 lecture1
2 java - operators
1 java - data type
6 java - loop
Search engine and web crawler
3 java - variable type

Similar to Security & Protection (20)

PDF
Ch13 protection
PPTX
Operating Systems Protection and Security
PDF
PPT
Chapter 14 - Protection
PPT
Ch18 OS
 
PPT
PPTX
L-3.1.1 (1).pptx
PPT
PPTX
Protection and security
PDF
Access control
PPTX
Security Environment, Design Principles Of Security
PPTX
securityandprotection Design Principles Of Security
PPT
W ch14
PPTX
Protection Domain and Access Matrix Model -Operating System
PPTX
security in is.pptx
PPT
Lecture 19 - Materials Protection Operating System
Ch13 protection
Operating Systems Protection and Security
Chapter 14 - Protection
Ch18 OS
 
L-3.1.1 (1).pptx
Protection and security
Access control
Security Environment, Design Principles Of Security
securityandprotection Design Principles Of Security
W ch14
Protection Domain and Access Matrix Model -Operating System
security in is.pptx
Lecture 19 - Materials Protection Operating System
Ad

More from vinay arora (20)

DOCX
Use case diagram (airport)
DOCX
Use case diagram
DOCX
Lab exercise questions (AD & CD)
PDF
SEM - UML (1st case study)
PPT
Uta005 lecture3
PPT
Uta005 lecture2
PDF
CG - Output Primitives
PDF
CG - Display Devices
PDF
CG - Input Output Devices
PDF
CG - Introduction to Computer Graphics
PDF
C Prog. - Strings (Updated)
PDF
C Prog. - Structures
PPT
A&D - UML
PDF
A&D - Object Oriented Design using UML
PDF
C Prog - Strings
PDF
C Prog - Pointers
PDF
C Prog - Array
PDF
C Prog - Array
PPT
A&D - Input Design
PDF
A&D - Object Oriented Analysis using UML
Use case diagram (airport)
Use case diagram
Lab exercise questions (AD & CD)
SEM - UML (1st case study)
Uta005 lecture3
Uta005 lecture2
CG - Output Primitives
CG - Display Devices
CG - Input Output Devices
CG - Introduction to Computer Graphics
C Prog. - Strings (Updated)
C Prog. - Structures
A&D - UML
A&D - Object Oriented Design using UML
C Prog - Strings
C Prog - Pointers
C Prog - Array
C Prog - Array
A&D - Input Design
A&D - Object Oriented Analysis using UML
Ad

Recently uploaded (20)

PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
IGGE1 Understanding the Self1234567891011
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
My India Quiz Book_20210205121199924.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
A powerpoint presentation on the Revised K-10 Science Shaping Paper
IGGE1 Understanding the Self1234567891011
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
What if we spent less time fighting change, and more time building what’s rig...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
Computer Architecture Input Output Memory.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
My India Quiz Book_20210205121199924.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer

Security & Protection

  • 1. Protection & Security Organized By: V.A. V.A. CSED,TU
  • 2. Disclaimer This is NOT A COPYRIGHT MATERIAL Content has been taken mainly from the following books: Operating Systems Concepts By Silberschatz & Galvin , Operating systems By D M Dhamdhere, System Programming By John J Donovan etc… VA. CSED,TU
  • 3. Protection – Goals & Principle  Each Object has a Unique Name and can be accessed through a well-defined set of Operations.  Ensure that each Object is accessed correctly and only by those Processes that are allowed to do so.  Guiding Principle – Principle of Least Privilege  Programs, users and systems should be given just enough privileges to perform their tasks VA. CSED,TU
  • 4. Domain Structure  Access-right = <object-name, rights-set> where rights-set is a subset of all valid operations that can be performed on the object.  Domain = Set of Access-Rights  Domain can be realized in variety of ways: Each User, Each Process and Each Procedure. VA. CSED,TU
  • 5. Access Matrix  View Protection as a MATRIX (access matrix)  Rows represent Domains  Columns represent Objects  Access (i, j) is the Set Of Operations that a process executing in Domaini can invoke on Objectj VA. CSED,TU
  • 6. Access Control Matrix  Access control matrix consists of triple parts such as subject, object, and access operation.  A SUBJECT is an Active Entity in a computer system such as User, Program, Process and Thread.  An OBJECT is a Passive Entity or System Resource such as File, Directory, Database Record and Printer.  In Access Control Matrix’s schema, the Subjects and Objects are placed in a table. Each row represents a Subject and each column represents an Object.  The data inside the table are Set Of Access Operations such as read, write, and execute. The access operations are responsible for interactions between subjects and objects. VA. CSED,TU
  • 7. Access Matrix VA. CSED,TU
  • 8. Use of Access Matrix  If a Process in Domain Di tries to do “op” on object Oj, then “op” must be in the ACCESS MATRIX.  Can be Expanded to DYNAMIC PROTECTION.  Operations to ADD, DELETE access rights.  Special Access Rights:  Owner of Oi  Copy op from Oi to Oj  Control – Di can modify Dj access rights  Transfer – Switch from domain Di to Dj VA. CSED,TU
  • 9. Access Matrix – Showing Switch VA. CSED,TU
  • 10. Role Based Access Control VA. CSED,TU
  • 11. Sample Access Matrix The Derivative forms of access control matrix such as Access Control List (ACL) and Capability List (C-list) are better applied. VA. CSED,TU
  • 12. Access Control List VA. CSED,TU
  • 13. ACL When we look for Insurance Data we can write: VA. CSED,TU
  • 14. C-List VA. CSED,TU
  • 15. C-List When we look for Alice’s C-list we can write: VA. CSED,TU
  • 16. ACL vs CL VA. CSED,TU
  • 17. Security  Security must consider External Environment of the System and protect the system resources  Intruders (crackers) attempt to breach security  THREAT is potential security violation  ATTACK is attempt to breach security  Attack can be accidental or malicious  Easier to protect against accidental than malicious misuse VA. CSED,TU
  • 18. Security Violations  Categories  Breach of confidentiality  Breach of integrity  Breach of availability  Theft of service  Denial of service  Methods  Masquerading (breach authentication)  Replay attack  Message modification  Man-in-the-middle attack  Session hijacking VA. CSED,TU
  • 19. Security Attacks VA. CSED,TU
  • 20. Reference List Operating Systems Concepts By Silberschatz & Galvin, Operating systems By D M Dhamdhere, System Programming By John J Donovan, www.os-book.com www.cs.jhu.edu/~yairamir/cs418/os2/sld001.htm http://gaia.ecs.csus.edu/~zhangd/oscal/pscheduling.html http://www.edugrid.ac.in/iiitmk/os/os_module03.htm http://williamstallings.com/OS/Animations.html etc… VA. CSED,TU