SlideShare a Scribd company logo
Chapter Last
Security and Protection
Overview
• Security refers to providing a protection system to
computer system resources such as CPU, memory,
disk, software programs and most importantly
data/information stored in the computer system.
• a computer system must be protected against
unauthorized access, malicious access to system
memory, viruses, worms etc.
Authentication : Authentication refers to identifying
each user of the system and associating the executing
programs with those users.
Overview…..
• Operating Systems generally identifies/authenticates
users using following three ways :
– Username / Password
– User card/key
– User attribute – fingerprint/ eye retina
pattern/signature
One Time passwords: a unique password is required
every time user tries to login into the system. It can be
implemented by :
– Random numbers
– Secrete Key
– Network password
• Program Threats: If a user program made these process
do malicious tasks, then it is known as Program Threats.
• well-known program threats are as follows:
– Trojan Horse
– Trap Door
– Logic Bomb
– Virus
• System Threats : System threats refers to misuse of
system services and network connections to put user in
trouble well-known system threats.
– Worm
– Port Scanning
– DoS
Overview…..
Security methods and devices
What is OS Security?
• The term operating system (OS) security refers to
practices and measures that can ensure the
confidentiality, integrity, and availability (CIA) of
operating systems.
• Involves the implementation of control techniques
that can protect your assets from unauthorized
modification and deletion or theft.
• The goal of OS security is to protect the OS from:
– various threats
– malicious software such as worms, Trojans and
other viruses,
– misconfigurations, and remote intrusions.
Cont.…
• The most common techniques used to protect
operating systems include
– the use of antivirus software and other endpoint
protection measures,
– regular OS patch updates,
– a firewall for monitoring network traffic, and
– enforcement of secure access through least
privileges and user controls.
Cont.…
• Here are a few of the most common threat vectors that
can affect an operating system.
• Malware is injected into a system without the owner’s
consent, or by masquerading as legitimate software,
with the objective of stealing, destroying or corrupting
data, or compromising the device.
• A Denial of Service (DoS) attack is intended to clog a
system with fake requests so it becomes overloaded,
and eventually stops serving legitimate requests.
• Network intrusion occurs when an individual gains
access to a system for improper use. It can be Careless
insiders, malicious insiders, Masqueraders, Clandestine
users.
• Buffer Overflow: During a buffer overflow attack, the
buffer or other temporary data stores are overflowing
with data.
Here are a few ways that improve operating system security:
• Authentication Measures
– Security keys
– Username-password combinations
– Biometric signatures
– Multi-factor authentication
• Using One-Time Passwords
– Network passwords
– Random numbers
– Secret keys
• Virtualization enables you to abstract software from
hardware, effectively separating the two.
• OS virtualization enables you to multiple isolated user
environments using the same OS kernel. The technology that
creates and enables this type of isolation is called a
“hypervisor”
Cont.…
Here are a few testing methods you can use.
• Vulnerability assessment involves testing for
weaknesses that may be lying undetected in an
operating system.
– Scanning for known vulnerabilities
– Scanning the software and applications on an OS
– Scanning for malware
– Scanning for missing patches and updates
– Patch testing
– Port scanning
• Penetration testing, or pentesting, is a security
assessment strategy that uses vulnerability assessment
to identify how an attacker may successfully exploit
vulnerabilities in the system. the testing will be White
Box, Grey Box and Black Box testing
Cont.…
Protection, access, and authentication
• Authentication mechanism determines the user’s identity
before revealing the sensitive information.
• It is very crucial for the system or interfaces where the
user priority is to protect the confidential information.
• Authentication does not determine what tasks the
individual can do or what files the individual can see.
Authentication merely identifies and verifies who the
person or system is.
• Access control for an operating system determines how
the operating system implements accesses to system
resources by satisfying the security objectives of
integrity, availability, and secrecy.
• Protection refers to a mechanism which controls the
access of programs, processes, or users to the
resources defined by a computer system.
Models of protection
• Protection models represent the protected objects in a
system
– how users or subjects may request access to them,
– how access decisions are made, and
– how the rules governing access decisions may be altered.
• Access Matrix is a security model of protection state in
computer system.
• It is represented as a matrix.
• Access matrix is used to define the rights of each
process executing in the domain with respect to each
object.
• The rows of matrix represent domains and columns
represent objects.
• Each cell of matrix represents set of access rights which
are given to the processes of domain means each entry
(i, j) defines the set of operations that a process
executing in domain Di can invoke on object Oj.
Cont.…
Cont.….
• Memory protection is a way to manage access rights to
the specific memory regions. It is used by the majority of
multi-tasking operating systems.
• The main goal of the memory protection appears to be a
banning of a process to access the part of memory which
is not allocated to that process.
• Encryption is a method of securing data by scrambling
the bits of a computer’s files so that they become illegible.
• The only method of reading the encrypted files is by
decrypting them with a key; the key is unlocked with a
password.
• Recovery Management is the process of planning,
testing, and implementing the recovery procedures ad
standards required to restore service in the event of a
component failure;
– either by returning the component to normal operation, or
– taking alternative actions to restore service.

More Related Content

Similar to Chapter Last.ppt (20)

PPT
Regression
Sathishkumar Vasudevan
 
PPT
Security (IM).ppt
GooglePay16
 
PPTX
Introduction to cyber security
Geevarghese Titus
 
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 
PPTX
Cyber security presentation by Mr Navneet baboo, RN College Hajipur.pptx
kamleshabss
 
PPT
Information Security Audit and Analysis Module
AvinashAvuthu2
 
PDF
Security.pdf
Karthick Panneerselvam
 
PPT
3. security architecture and models
7wounders
 
PDF
OPERATING SYSTEM SECURITY
RohitK71
 
PPTX
Security and management
ArtiSolanki5
 
PPTX
Chapter 7
Seth Nurul
 
PPTX
presentation_security_1510578971_320573.pptx
AadityaRauniyar1
 
PDF
Intruders
Dr.Florence Dayana
 
PPTX
Protection and security of operating system
Abdullah Khosa
 
PPTX
Protection and security
mbadhi
 
PPTX
Computer Security
AkNirojan
 
PPTX
Security Architectures and Models.pptx
RushikeshChikane2
 
PPTX
Metasploit
Parth Sahu
 
PDF
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
dadkhah077
 
PDF
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
Security (IM).ppt
GooglePay16
 
Introduction to cyber security
Geevarghese Titus
 
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 
Cyber security presentation by Mr Navneet baboo, RN College Hajipur.pptx
kamleshabss
 
Information Security Audit and Analysis Module
AvinashAvuthu2
 
3. security architecture and models
7wounders
 
OPERATING SYSTEM SECURITY
RohitK71
 
Security and management
ArtiSolanki5
 
Chapter 7
Seth Nurul
 
presentation_security_1510578971_320573.pptx
AadityaRauniyar1
 
Protection and security of operating system
Abdullah Khosa
 
Protection and security
mbadhi
 
Computer Security
AkNirojan
 
Security Architectures and Models.pptx
RushikeshChikane2
 
Metasploit
Parth Sahu
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
dadkhah077
 
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 

More from miki304759 (9)

PPTX
Software Evolution and maintenance chapter 1
miki304759
 
PPTX
Software Evolution and maintenance chapter 3
miki304759
 
PPT
Advanced Programming, Java Programming, Applets.ppt
miki304759
 
PPT
Chapter 1- Introduction.ppt
miki304759
 
PPTX
Elements of Graph Theory for IS.pptx
miki304759
 
PPT
Chapter one_oS.ppt
miki304759
 
PPTX
Chapter 3 SE 2015.pptx
miki304759
 
PPTX
Chapter One Function.pptx
miki304759
 
PPTX
4_5809869271378954936.pptx
miki304759
 
Software Evolution and maintenance chapter 1
miki304759
 
Software Evolution and maintenance chapter 3
miki304759
 
Advanced Programming, Java Programming, Applets.ppt
miki304759
 
Chapter 1- Introduction.ppt
miki304759
 
Elements of Graph Theory for IS.pptx
miki304759
 
Chapter one_oS.ppt
miki304759
 
Chapter 3 SE 2015.pptx
miki304759
 
Chapter One Function.pptx
miki304759
 
4_5809869271378954936.pptx
miki304759
 

Recently uploaded (20)

PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PDF
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PPTX
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
PDF
勉強会資料_An Image is Worth More Than 16x16 Patches
NABLAS株式会社
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PPTX
Basics of Auto Computer Aided Drafting .pptx
Krunal Thanki
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PPTX
Ground improvement techniques-DEWATERING
DivakarSai4
 
PDF
Air -Powered Car PPT by ER. SHRESTH SUDHIR KOKNE.pdf
SHRESTHKOKNE
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PPTX
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
勉強会資料_An Image is Worth More Than 16x16 Patches
NABLAS株式会社
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Inventory management chapter in automation and robotics.
atisht0104
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
Basics of Auto Computer Aided Drafting .pptx
Krunal Thanki
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
Ground improvement techniques-DEWATERING
DivakarSai4
 
Air -Powered Car PPT by ER. SHRESTH SUDHIR KOKNE.pdf
SHRESTHKOKNE
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 

Chapter Last.ppt

  • 2. Overview • Security refers to providing a protection system to computer system resources such as CPU, memory, disk, software programs and most importantly data/information stored in the computer system. • a computer system must be protected against unauthorized access, malicious access to system memory, viruses, worms etc. Authentication : Authentication refers to identifying each user of the system and associating the executing programs with those users.
  • 3. Overview….. • Operating Systems generally identifies/authenticates users using following three ways : – Username / Password – User card/key – User attribute – fingerprint/ eye retina pattern/signature One Time passwords: a unique password is required every time user tries to login into the system. It can be implemented by : – Random numbers – Secrete Key – Network password
  • 4. • Program Threats: If a user program made these process do malicious tasks, then it is known as Program Threats. • well-known program threats are as follows: – Trojan Horse – Trap Door – Logic Bomb – Virus • System Threats : System threats refers to misuse of system services and network connections to put user in trouble well-known system threats. – Worm – Port Scanning – DoS Overview…..
  • 5. Security methods and devices What is OS Security? • The term operating system (OS) security refers to practices and measures that can ensure the confidentiality, integrity, and availability (CIA) of operating systems. • Involves the implementation of control techniques that can protect your assets from unauthorized modification and deletion or theft. • The goal of OS security is to protect the OS from: – various threats – malicious software such as worms, Trojans and other viruses, – misconfigurations, and remote intrusions.
  • 6. Cont.… • The most common techniques used to protect operating systems include – the use of antivirus software and other endpoint protection measures, – regular OS patch updates, – a firewall for monitoring network traffic, and – enforcement of secure access through least privileges and user controls.
  • 7. Cont.… • Here are a few of the most common threat vectors that can affect an operating system. • Malware is injected into a system without the owner’s consent, or by masquerading as legitimate software, with the objective of stealing, destroying or corrupting data, or compromising the device. • A Denial of Service (DoS) attack is intended to clog a system with fake requests so it becomes overloaded, and eventually stops serving legitimate requests. • Network intrusion occurs when an individual gains access to a system for improper use. It can be Careless insiders, malicious insiders, Masqueraders, Clandestine users. • Buffer Overflow: During a buffer overflow attack, the buffer or other temporary data stores are overflowing with data.
  • 8. Here are a few ways that improve operating system security: • Authentication Measures – Security keys – Username-password combinations – Biometric signatures – Multi-factor authentication • Using One-Time Passwords – Network passwords – Random numbers – Secret keys • Virtualization enables you to abstract software from hardware, effectively separating the two. • OS virtualization enables you to multiple isolated user environments using the same OS kernel. The technology that creates and enables this type of isolation is called a “hypervisor” Cont.…
  • 9. Here are a few testing methods you can use. • Vulnerability assessment involves testing for weaknesses that may be lying undetected in an operating system. – Scanning for known vulnerabilities – Scanning the software and applications on an OS – Scanning for malware – Scanning for missing patches and updates – Patch testing – Port scanning • Penetration testing, or pentesting, is a security assessment strategy that uses vulnerability assessment to identify how an attacker may successfully exploit vulnerabilities in the system. the testing will be White Box, Grey Box and Black Box testing Cont.…
  • 10. Protection, access, and authentication • Authentication mechanism determines the user’s identity before revealing the sensitive information. • It is very crucial for the system or interfaces where the user priority is to protect the confidential information. • Authentication does not determine what tasks the individual can do or what files the individual can see. Authentication merely identifies and verifies who the person or system is. • Access control for an operating system determines how the operating system implements accesses to system resources by satisfying the security objectives of integrity, availability, and secrecy. • Protection refers to a mechanism which controls the access of programs, processes, or users to the resources defined by a computer system.
  • 11. Models of protection • Protection models represent the protected objects in a system – how users or subjects may request access to them, – how access decisions are made, and – how the rules governing access decisions may be altered. • Access Matrix is a security model of protection state in computer system. • It is represented as a matrix. • Access matrix is used to define the rights of each process executing in the domain with respect to each object. • The rows of matrix represent domains and columns represent objects. • Each cell of matrix represents set of access rights which are given to the processes of domain means each entry (i, j) defines the set of operations that a process executing in domain Di can invoke on object Oj.
  • 13. Cont.…. • Memory protection is a way to manage access rights to the specific memory regions. It is used by the majority of multi-tasking operating systems. • The main goal of the memory protection appears to be a banning of a process to access the part of memory which is not allocated to that process. • Encryption is a method of securing data by scrambling the bits of a computer’s files so that they become illegible. • The only method of reading the encrypted files is by decrypting them with a key; the key is unlocked with a password. • Recovery Management is the process of planning, testing, and implementing the recovery procedures ad standards required to restore service in the event of a component failure; – either by returning the component to normal operation, or – taking alternative actions to restore service.