Group No.5
Name
• Muhammad Abdullah
• Sarmad Ali
• Hashaam Altaf
• Hanif Shah
• Noman Rasool
• Imran Ahmed
Roll No.
• 02
• 01
• 38
• 45
• 25
• 46
Topic:
Protection and Security of
Operating System
Muhammad
Abdullah
Protection:
•Protection refers to a mechanism for controlling the
access of programs, processes, or users to the
resources defined by a computer system.
Goals of Protection:
•As computer systems have become more sophisticated
and pervasive in their applications, the need to protect
their integrity has also grown.
•We need to provide protection for several reasons. The
most obvious is the need to prevent the mischievous,
intentional violation of an access restriction by user.
• An unprotected resource cannot defend against use (or
misuse) by an unauthorized or incompetent user.
•The role of protection in a computer system is to provide a
mechanism for the enforcement of the policies governing
resource use.
Principles of Protection:
•The time-tested guiding principle for protection is the
Principle of least privilege. It dictates that programs,
users, and even systems be given just enough privileges
to perform their tasks.
•An operating system following the principle of least
privilege implements its features, programs, system
calls, and data structures so that failure or compromise
of a component does the minimum damage and allows
the minimum damage to be done.
Domain of Protection:
•A computer system is a collection of processes and
objects. By objects, we mean both hardware objects
(such as the CPU, printer) and software objects(such as
files, programs).
•Each object has a unique name that differentiates it from
all other objects in the system, and each can be accessed
only through well-defined and meaningful operations.
Domain Structures.
•Each domain defines a set of objects and the types
of operations that may be invoked on each object.
• The ability to execute an operation on an object is
an access right.
•A domain can be realized in a variety of ways:
•Each user may be a domain. In this case, the set of
objects that can be accessed depends on the
identity of the user.
•Each process may be a domain. In this case, the set
of objects that can be accessed depends on the
identity of the process.
Cont…
•For example, if domain D has the access right
<file F, {read, write}>, then a process executing
in domain D can both read and write file F; it
cannot, however, perform any other operation on
that object.
Example:
UNIX System:
•In the UNIX operating system, a domain is
associated with the user
•In Unix operating system user ID’s use for
identify the domain.
Hashaam Altaf
Access Matrix:
•Our model of protection can be viewed
abstractly as a matrix, called an Access Matrix.
The column of the access matrix represent
domains, and the rows represent objects. Each
entry in the matrix consists of a set of access
rights.
Access Control:
•Access Control is to control which objects a
given program can access, and in what ways.
Objects are things like files, sound cards, other
programs, the network, your modem etc.
•When we talk about ``controlling access,'' we
are really talking about four kinds of things:
i) Preventing access. ii) Limiting access.
iii) Granting access . iv) Revoking access.
Cont...
•A good example of this is found in Solaris 10.
•Solaris uses Role-based access control(RBAC)
to adding the principle.
•Role-based access control (RBAC) is a security
feature for controlling user access to tasks that
would normally be restricted to the root user.
• In conventional UNIX systems, the root user,
also referred to as superuser. The root user has
the ability to read and write to any file, run all
programs, and send kill signals to any process.
Syed Muhammad
Hanif Shah
Capability-based Systems:
•In a capability-based computer system, all access to
objects is done through capabilities, and capabilities
provide the only means of accessing objects. In such a
system, every program holds a set of capabilities.
•If program A holds a capability to talk to program B,
then the two programs can grant capabilities to each
other.
•In most capability-based systems, a program can hold an
infinite number of capabilities. Such systems have
tended to be slow.
Cont...
•A better design allows each program to hold a
fixed (and small -- like 16 or 32) number of
capabilities, and provides a means for storing
additional capabilities if they are needed.
•Here two example are discuss
•Cambridge CAP System.
•Hydra
Cambridge CAP System:
•The Cambridge CAP computer was the first
successful experimental computer that demonstrated
the use of security capabilities, both in hardware and
software .
•The CAP system was designed such that any access to
a memory segment or hardware required that the
current process held the necessary capabilities.
•CAP has two kinds of capabilities.
•Data Capability.
•Software Capability.
Cont…
•Data Capability:
It can be used to provide access to objects, but the only
rights provided are the standard read, write, and execute
of the individual storage segments associated with the
object.
•Software Capability:
It is a protected procedure, which may be written by an
application programmer as part of a subsystem. A particular
kind of rights amplification is associated with a protected
procedure. When executing the code, a process temporarily
acquires the right to read or write the contents of a software
capability itself.
Noman Rasool
Hydra:
•Hydra is a capability-based protection system
that provides considerable flexibility. The
system implements a fixed set of possible access
rights.
• In addition, a user can declare other rights. The
interpretation of user-defined rights is performed
by the user's program, but the system provides
access protection for the use of these rights.
Language Based Protection:
•As operating systems have become more complex,
and particularly as they have attempted to provide
higher-level user interfaces, the goals of protection
have become much more refined. The designers of
protection systems have drawn heavily on ideas that
originated in programming languages and especially
on the concepts of abstract data types and objects.
•There must be a protection policy to control the
access of user defined programs.
Cont…
• Protection systems are now concerned not only with the
identity of a resource to which access is attempted but
also with the functional nature of that access.
•It is usually achieved through an operating-system
kernel, which acts as a security agent to inspect and
validate each attempt to access a protected resource.
SECURITY
• ensure that each object is accessed correctly and only by
those processes of authorized users that are allowed to do
so.
Security violation of the System can be categorized as:
• Breach of Confidentiality: Unauthorized reading of data.
• Breach of Integrity: Unauthorized modification of data.
• Breach of Availability: Unauthorized destruction of data.
• Theft of Service: Unauthorized use of resources.
• Denial of service: Preventing legitimate use of the system.
Imran Ahmed
Security Measures
• Physical: Both the machine rooms and the terminals or workstations
that have access to the machines must be secures from physical
entry.
• Human: Authorization must be done carefully to ensure that only
appropriate users have access to the system.
• Operating System: The system must protect itself from accidental or
purposeful security breaches.
• Network: protection from the travel of data to private leased lines
like Internet.
• User Authentication: User should use some password or biometric
authentications to protect the System.
Security Kernal
• Responsible for implementing the security mechanisms of the entire
operating system.
• Provides the security interfaces among the hardware, the operating
system, and the other parts of the computing system.
Program Threats:
• Virus dropper inserts virus onto the system. Use backdoor to access data.
• Trojan Horse: A code segment that misuses its environment is called a
Trojan horse.
Trap Doors: user’s access privileges code into program.
• Virus: A virus is a fragment of code embedded in a legitimate programs.
They can wreck havoc in a system by modifying or destroying files and
causing system crashes program malfunctions.
System and Network
Threats
• System and network threats create situation in which operating
system resources and user files are misused.
• Worms: A worm is a process that uses the spawn mechanism to
duplicate itself. The worm spawns copies of itself using up system
resources and perhaps locking out all other processes.

More Related Content

PPTX
Deadlocks in operating system
PPTX
Mobile cloud Computing
PPTX
Cyber Security Introduction.pptx
PPTX
Paging and segmentation
PPTX
Windows operating system
PPT
Eidws 107 information assurance
PPT
Protection and Security in Operating Systems
PDF
Lecture5 virtualization
Deadlocks in operating system
Mobile cloud Computing
Cyber Security Introduction.pptx
Paging and segmentation
Windows operating system
Eidws 107 information assurance
Protection and Security in Operating Systems
Lecture5 virtualization

What's hot (20)

PPTX
System security
PPTX
Operating system security
PPTX
Types of attacks
PPTX
Distributed file system
PPTX
Introduction to Distributed System
PPTX
Database Security
PPTX
Introduction to Network Security
PDF
8. mutual exclusion in Distributed Operating Systems
PPTX
Structure of shared memory space
PPTX
Basic concepts in computer security
PPTX
Protection and security
PPTX
Computer security concepts
PPTX
Goals of protection
PPT
Operating system support in distributed system
PPTX
Database security
PPTX
Access Controls
PDF
CS9222 Advanced Operating System
PPTX
System security
PPTX
System Security-Chapter 1
PPT
Network security
System security
Operating system security
Types of attacks
Distributed file system
Introduction to Distributed System
Database Security
Introduction to Network Security
8. mutual exclusion in Distributed Operating Systems
Structure of shared memory space
Basic concepts in computer security
Protection and security
Computer security concepts
Goals of protection
Operating system support in distributed system
Database security
Access Controls
CS9222 Advanced Operating System
System security
System Security-Chapter 1
Network security
Ad

Similar to Protection and security of operating system (20)

PPTX
protection-151130150434-lva1-app6891.ppt_20240605_104455_0000.pptx
PPTX
System protection in Operating System
PPTX
Protection Domain and Access Matrix Model -Operating System
PPT
Chapter Last.ppt
PPTX
System Security Sem 2(Module 1).pptx
PPTX
Operating Systems Protection and Security
PPT
3. security architecture and models
PPTX
Computer , Internet and physical security.
PPTX
Enumeration and system hacking
PPT
Introduction to Operating Systems - Mary Margarat
PPTX
Least privilege, access control, operating system security
PPT
Security (IM).ppt
PPTX
File Protection in Operating System
PDF
Design and Analyze Secure Networked Systems - 7
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PPTX
securityandprotection Design Principles Of Security
PPTX
Security Environment, Design Principles Of Security
protection-151130150434-lva1-app6891.ppt_20240605_104455_0000.pptx
System protection in Operating System
Protection Domain and Access Matrix Model -Operating System
Chapter Last.ppt
System Security Sem 2(Module 1).pptx
Operating Systems Protection and Security
3. security architecture and models
Computer , Internet and physical security.
Enumeration and system hacking
Introduction to Operating Systems - Mary Margarat
Least privilege, access control, operating system security
Security (IM).ppt
File Protection in Operating System
Design and Analyze Secure Networked Systems - 7
Ethical Hacking n VAPT presentation by Suvrat jain
securityandprotection Design Principles Of Security
Security Environment, Design Principles Of Security
Ad

More from Abdullah Khosa (20)

PDF
Chanel and H&M Brand Comparison.pdf
PPTX
Mycin presentation
PPTX
Policy directives of federal government of pakistan for Enterprise Architecture
PPTX
Face to Face Communication and Text Based Communication in HCI
PPT
STRATEGIC PAY PLANS
PPTX
AI services in google
PPTX
Cloud Artificial Intelligence services
PPTX
Digital centralization
PPTX
Diamond water-paradox (A Theory)
PPTX
The 5th generation (5G)
PDF
Report of database of list of Pakistan international cricket stadiums
PPTX
Database of list of Pakistan international cricket stadiums
PPTX
Attitude and behavior
PPTX
Digital signature
PDF
Benefits of Search engine optimization
PDF
Physical Database Design & Performance
PDF
Advanced Normalization
PDF
Relational Algebra & Calculus
PDF
Advance database system(part 8)
PDF
Advance database system(part 7)
Chanel and H&M Brand Comparison.pdf
Mycin presentation
Policy directives of federal government of pakistan for Enterprise Architecture
Face to Face Communication and Text Based Communication in HCI
STRATEGIC PAY PLANS
AI services in google
Cloud Artificial Intelligence services
Digital centralization
Diamond water-paradox (A Theory)
The 5th generation (5G)
Report of database of list of Pakistan international cricket stadiums
Database of list of Pakistan international cricket stadiums
Attitude and behavior
Digital signature
Benefits of Search engine optimization
Physical Database Design & Performance
Advanced Normalization
Relational Algebra & Calculus
Advance database system(part 8)
Advance database system(part 7)

Recently uploaded (20)

PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Complications of Minimal Access-Surgery.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
HVAC Specification 2024 according to central public works department
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
advance database management system book.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
International_Financial_Reporting_Standa.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
Virtual and Augmented Reality in Current Scenario
Complications of Minimal Access-Surgery.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
History, Philosophy and sociology of education (1).pptx
HVAC Specification 2024 according to central public works department
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
advance database management system book.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
International_Financial_Reporting_Standa.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
TNA_Presentation-1-Final(SAVE)) (1).pptx
Chinmaya Tiranga quiz Grand Finale.pdf

Protection and security of operating system

  • 1. Group No.5 Name • Muhammad Abdullah • Sarmad Ali • Hashaam Altaf • Hanif Shah • Noman Rasool • Imran Ahmed Roll No. • 02 • 01 • 38 • 45 • 25 • 46
  • 2. Topic: Protection and Security of Operating System
  • 4. Protection: •Protection refers to a mechanism for controlling the access of programs, processes, or users to the resources defined by a computer system.
  • 5. Goals of Protection: •As computer systems have become more sophisticated and pervasive in their applications, the need to protect their integrity has also grown. •We need to provide protection for several reasons. The most obvious is the need to prevent the mischievous, intentional violation of an access restriction by user. • An unprotected resource cannot defend against use (or misuse) by an unauthorized or incompetent user. •The role of protection in a computer system is to provide a mechanism for the enforcement of the policies governing resource use.
  • 6. Principles of Protection: •The time-tested guiding principle for protection is the Principle of least privilege. It dictates that programs, users, and even systems be given just enough privileges to perform their tasks. •An operating system following the principle of least privilege implements its features, programs, system calls, and data structures so that failure or compromise of a component does the minimum damage and allows the minimum damage to be done.
  • 7. Domain of Protection: •A computer system is a collection of processes and objects. By objects, we mean both hardware objects (such as the CPU, printer) and software objects(such as files, programs). •Each object has a unique name that differentiates it from all other objects in the system, and each can be accessed only through well-defined and meaningful operations.
  • 8. Domain Structures. •Each domain defines a set of objects and the types of operations that may be invoked on each object. • The ability to execute an operation on an object is an access right. •A domain can be realized in a variety of ways: •Each user may be a domain. In this case, the set of objects that can be accessed depends on the identity of the user. •Each process may be a domain. In this case, the set of objects that can be accessed depends on the identity of the process.
  • 9. Cont… •For example, if domain D has the access right <file F, {read, write}>, then a process executing in domain D can both read and write file F; it cannot, however, perform any other operation on that object.
  • 10. Example: UNIX System: •In the UNIX operating system, a domain is associated with the user •In Unix operating system user ID’s use for identify the domain.
  • 12. Access Matrix: •Our model of protection can be viewed abstractly as a matrix, called an Access Matrix. The column of the access matrix represent domains, and the rows represent objects. Each entry in the matrix consists of a set of access rights.
  • 13. Access Control: •Access Control is to control which objects a given program can access, and in what ways. Objects are things like files, sound cards, other programs, the network, your modem etc. •When we talk about ``controlling access,'' we are really talking about four kinds of things: i) Preventing access. ii) Limiting access. iii) Granting access . iv) Revoking access.
  • 14. Cont... •A good example of this is found in Solaris 10. •Solaris uses Role-based access control(RBAC) to adding the principle. •Role-based access control (RBAC) is a security feature for controlling user access to tasks that would normally be restricted to the root user. • In conventional UNIX systems, the root user, also referred to as superuser. The root user has the ability to read and write to any file, run all programs, and send kill signals to any process.
  • 16. Capability-based Systems: •In a capability-based computer system, all access to objects is done through capabilities, and capabilities provide the only means of accessing objects. In such a system, every program holds a set of capabilities. •If program A holds a capability to talk to program B, then the two programs can grant capabilities to each other. •In most capability-based systems, a program can hold an infinite number of capabilities. Such systems have tended to be slow.
  • 17. Cont... •A better design allows each program to hold a fixed (and small -- like 16 or 32) number of capabilities, and provides a means for storing additional capabilities if they are needed. •Here two example are discuss •Cambridge CAP System. •Hydra
  • 18. Cambridge CAP System: •The Cambridge CAP computer was the first successful experimental computer that demonstrated the use of security capabilities, both in hardware and software . •The CAP system was designed such that any access to a memory segment or hardware required that the current process held the necessary capabilities. •CAP has two kinds of capabilities. •Data Capability. •Software Capability.
  • 19. Cont… •Data Capability: It can be used to provide access to objects, but the only rights provided are the standard read, write, and execute of the individual storage segments associated with the object. •Software Capability: It is a protected procedure, which may be written by an application programmer as part of a subsystem. A particular kind of rights amplification is associated with a protected procedure. When executing the code, a process temporarily acquires the right to read or write the contents of a software capability itself.
  • 21. Hydra: •Hydra is a capability-based protection system that provides considerable flexibility. The system implements a fixed set of possible access rights. • In addition, a user can declare other rights. The interpretation of user-defined rights is performed by the user's program, but the system provides access protection for the use of these rights.
  • 22. Language Based Protection: •As operating systems have become more complex, and particularly as they have attempted to provide higher-level user interfaces, the goals of protection have become much more refined. The designers of protection systems have drawn heavily on ideas that originated in programming languages and especially on the concepts of abstract data types and objects. •There must be a protection policy to control the access of user defined programs.
  • 23. Cont… • Protection systems are now concerned not only with the identity of a resource to which access is attempted but also with the functional nature of that access. •It is usually achieved through an operating-system kernel, which acts as a security agent to inspect and validate each attempt to access a protected resource.
  • 24. SECURITY • ensure that each object is accessed correctly and only by those processes of authorized users that are allowed to do so. Security violation of the System can be categorized as: • Breach of Confidentiality: Unauthorized reading of data. • Breach of Integrity: Unauthorized modification of data. • Breach of Availability: Unauthorized destruction of data. • Theft of Service: Unauthorized use of resources. • Denial of service: Preventing legitimate use of the system.
  • 26. Security Measures • Physical: Both the machine rooms and the terminals or workstations that have access to the machines must be secures from physical entry. • Human: Authorization must be done carefully to ensure that only appropriate users have access to the system. • Operating System: The system must protect itself from accidental or purposeful security breaches. • Network: protection from the travel of data to private leased lines like Internet. • User Authentication: User should use some password or biometric authentications to protect the System.
  • 27. Security Kernal • Responsible for implementing the security mechanisms of the entire operating system. • Provides the security interfaces among the hardware, the operating system, and the other parts of the computing system. Program Threats: • Virus dropper inserts virus onto the system. Use backdoor to access data. • Trojan Horse: A code segment that misuses its environment is called a Trojan horse. Trap Doors: user’s access privileges code into program. • Virus: A virus is a fragment of code embedded in a legitimate programs. They can wreck havoc in a system by modifying or destroying files and causing system crashes program malfunctions.
  • 28. System and Network Threats • System and network threats create situation in which operating system resources and user files are misused. • Worms: A worm is a process that uses the spawn mechanism to duplicate itself. The worm spawns copies of itself using up system resources and perhaps locking out all other processes.