Professional Documents
Culture Documents
OPERATING SYSTEMS-
PROTECTION AND SECURITY
Technical Seminar
Under Guidance of
Mr. Anisur Rahman
Presented By
Padma Dash Roll # CS200157131
PROTECTION
National Institute of Science and Technology
DOMAIN OF PROTECTION
National Institute of Science and Technology
DOMAIN STRUCTURE
National Institute of Science and Technology
• ACCESS RIGHT
-The ability to execute an operation on an object.
-Defined as an ordered pair<object name, rights set>.
• Domain is a set of access rights.
• Example
-a process executing in D1 can read and write object O3.
D1 D2 D3
ACCESS MATRIX
National Institute of Science and Technology
object F1 F2 F3 Printer
domain
D1 read read
D2 Print
D3 read execute
D3 read execute
• Global table
-A set of ordered triples <domain, object, right set>
• Access control list
-A list of sets( one per object). Each set has an ordered
pair< domain, right set>
• Capability list
-A list of sets( one per domain). Each set has a
capability list of type< object, right set>.
• A lock-key mechanism
-Each domain has a list of unique locks, each domain
has list keys. A process executing in a domain can
access an object if the domain has a key to one of the
object locks.
• MEMORY PROTECTION
National Institute of Science and Technology
no no
•CPU PROTECTION
-A fixed or variable timer used
Padma Dash [9]
Operating Systems – Protection and Security
SECURITY IN COMPUTERS
National Institute of Science and Technology
-TAMPERING/MODIFICATION/FABRICATION
An unauthorized party gains access and tampers with
an asset of the system.
-RESOURCE STEALING
An unauthorized party uses system resources .
• AUTHENTICATION
• PASSWORDS
- User identity most often established through
passwords, it must be kept secret.
-Can be computer generated ones, one time
passwords
Padma Dash [11]
Operating Systems – Protection and Security
VIRUSES
National Institute of Science and Technology
• TRAP-DOORS
-Entry point into a program that allows someone who is aware
of the trap door to gain access.
-Used by programmers to debug and test program.
• TROJAN HORSE
-A program that contains hidden code that when invoked
performs some unwanted or harmful functions.
-Can be used to accomplish functions indirectly that an
unauthorized user cannot accomplish directly. The user may
set the file permissions so that everyone can access.
e.g.. fake login screen
• BACTERIA
National Institute of Science and Technology
-Replicate themselves.
-Reproduce exponentially.
-Take all the processor capacity, memory, disk space and
then deny users to access.
• WORM
- Uses network connection to spread from system to system.
- Electronic mail facility
It mails a copy of itself to other systems.
- Remote execution capability
It executes a copy of itself on other systems.
- Remote log-in capability
It logs-on as a user and then uses commands to copy itself
from one system to another.
CONCLUSION
National Institute of Science and Technology
Thank You!!!