Unit 5 Sols
Unit 5 Sols
Protection Security
Protection deals with access to the Security grants the system access
system resources. to the appropriate users only.
Internal threats are involved. External threats are involved.
Simple queries are handled. More complex queries are
handled.
Protection determines what files Security illustrates that which
can be accessed or permeated by person is granted for using the
a special user. system.
an authorization mechanism is Encryption and
implemented. certification(authentication)
mechanisms are used
a technique used in operating a technique used in operating
systems to control hazards and systems to address threats from
maintain the system's proper outside the system to maintain its
functioning. proper functioning.
It offers a technique for controlling It offers a technique for protecting
access to processes, programs, system and user resources from
and user resources. unauthorized access.
1. Global Table
2. Access Lists for Objects
3. Capability Lists for Domains
Global Table
Every access matrix column may be used as a single object's access list. It
is possible to delete the blank entries. For each object, the resulting list
contains ordered pairs <domain, rights-set> that define all domains for
that object and a nonempty set of access rights.
We may start by checking the default set and then find the access list. If the
item is found, we enable the action; if it isn't, we verify the default set. If M is
in the default set, we grant access. Access is denied if this is not the case,
and an extraordinary scenario arises.
A domain's capability list is a collection of objects and the actions that can
be done on them. A capacity is a name or address that is used to define an
object. If you want to perform operation M on object Oj, the process runs
operation M, specifying the capability for object Oj. The simple possession
of the capability implies that access is allowed.
In most cases, capabilities are separated from other data in one of two
ways. Every object has a tag to indicate its type as capability data.
Alternatively, a program's address space can be divided into two portions.
The programs may access one portion, including the program's normal
instructions and data. The other portion is a capability list that is only
accessed by the operating system.
There are two types of security breaches that can harm the system:
malicious and accidental. Malicious threats are a type of destructive
computer code or web script that is designed to cause system
vulnerabilities that lead to back doors and security breaches. On the other
hand, Accidental Threats are comparatively easier to protect against.
1. Breach of integrity
2. Theft of service
3. Breach of confidentiality
4. Breach of availability
5.Denial of service
11. What are the different level of security measures to protect the
system?
1. Breach of Confidentiality:
• This type of violation involves unauthorized reading of data. It is
done by intruders.
• They capture secret data from the system.
• Encryption: Implementing encryption algorithms to protect
sensitive data from unauthorized access.
• Access Control: Setting permissions and access levels to
restrict access to confidential information only to authorized
users.
• Authentication: Implementing strong authentication
mechanisms such as passwords, biometrics, or two-factor
authentication to verify the identity of users.
2. Breach of Integrity:
• This violation involves unauthorized modification of data or
source code.
• Data Validation: Checking data inputs to ensure they are valid
and have not been tampered with.
• Digital Signatures: Using digital signatures to verify the integrity
of files and documents.
• Version Control: Implementing version control systems to
track changes and prevent unauthorized modifications to files
and software.
3. Breach of Availability:
• It involves unauthorized destruction of data.
• Redundancy: Implementing redundancy in hardware and
networks to ensure availability in case of failures.
• Disaster Recovery: Developing disaster recovery plans and
backup systems to minimize downtime and ensure continuity
of operations.
• Load Balancing: Distributing network traffic evenly across
multiple servers to prevent overload and ensure availability.
4. Theft of Service:
• It involves unauthorized use of resources.
• Network Security: Implementing firewalls, intrusion detection
systems, and network monitoring tools to detect and prevent
unauthorized access and usage of network resources.
• Resource Monitoring: Monitoring system resources such as
CPU, memory, and bandwidth usage to detect and prevent
abuse or unauthorized consumption.
• Usage Policies: Establishing usage policies and guidelines to
educate users about acceptable behavior and prevent misuse
of system resources.
17. Describe fire walling that is used to protect system and network.
Firewall is a network security device that observes and filters incoming and
outgoing network traffic, adhering to the security policies defined by an
organization. Essentially, it acts as a protective wall between a private
internal network and the public Internet.