0% found this document useful (0 votes)
133 views1 page

OS Report

The document discusses computer system protection. It aims to explain how protection domains and access matrices specify resources a process can access. It also examines capability- and language-based protection systems. The document introduces protection mechanisms that control user access to files and resources. Protection provides authorization so only authorized processes can access memory, CPUs, and other system resources. It must specify access controls and enforce them.

Uploaded by

Richard Arellano
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
133 views1 page

OS Report

The document discusses computer system protection. It aims to explain how protection domains and access matrices specify resources a process can access. It also examines capability- and language-based protection systems. The document introduces protection mechanisms that control user access to files and resources. Protection provides authorization so only authorized processes can access memory, CPUs, and other system resources. It must specify access controls and enforce them.

Uploaded by

Richard Arellano
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Objectives

To discuss the goals and principles of protection in a modern computer system. To explain how protection domains, combined with an access matrix, are used to specify the resources a process may access. To examine capability- and language-based protection systems.

Introduction
Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition, protection must ensure that only processes that have gained proper authorization from the operating system can operate on memory segments, the CPU, and other resources. Protection is provided by a mechanism that controls the access of programs, processes, or users to the resources defined by a computer system. This mechanism must provide a means for specifying the controls to be imposed, together with a means of enforcing them.

System Protection
The processes in an operating system must be protected from one another's activities. To provide such protection, we can use various mechanisms to ensure that only processes that have gained proper authorization from the operating system can operate on the files, memory segments, CPU, and other resources of a system. Protection refers to a mechanism for controlling the access of programs, processes, or users to the resources defined by a computer system. This mechanism must provide a means for specifying the controls to be imposed, together with a means of enforcement. We distinguish between protection and security, which is a measure of confidence that the integrity of a system and its data will be preserved. In this chapter, we focus on protection.

Goals of Protection
Protect reliability and integrity of complex system. Provide a mechanism for the enforcement of the policies governing resource use. Terms to remember: Mechanisms determine how something will be done; Policies decide what will be done.

Principles of Protection
Principles of the least privilege - it dictates that programs, users, and even systems be given just enough privileges to perform their tasks.

You might also like