0% found this document useful (0 votes)
4 views

10th Lecture OS

Uploaded by

farwakhalid146
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

10th Lecture OS

Uploaded by

farwakhalid146
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Operating System

CS(407)

Lecture 10
System protection

Instructor
Sibgha Zia
Department of Computer Science
UAF Sub Campus Burewala
Introduction

• Protection refers to a mechanism which controls the access of


programs, processes, or users to the resources defined by a
computer system.
• A computer system is a collection of processes and objects .By
objects, we mean both hardware objects ( such as the CPU,
printer)and software objects ( such as files, programs).
• Each object has a unique name that differentiates it from all
other objects in the system .
The Protection Mechanism

 Distinguish between the authorized and unauthorized


usage.

 Specify the controls to be imposed.

 Provide a means of enforcement.


Types of system Protection.

 Memory Protection
 CPU Protection
 I/O Protection
Memory Protection
To protect the memory from illegal jumping of instruction we need some
protection method. base limit register and memory key.

Base Limit Register:


 the simplest method of memory protection is adding two register in CPU "Base“
and "Limit" that demonstrate a range of memory to which valid references can
be made.
 Reference out side the range cause a trap to the OS.
 Base address indicate the starting address of the process
Limit indicate the size of process.

Memory protection:
 It is used in IBM 360 OS
 It is a memory protection method in which we breakup all of the memory into
2kb pages and assign 4 bit key to each.
CPU Protection.

 To protect the CPU for the problem such as illegal execution of instruction
going to infinite time mechanism is used.

 Time start the functioning 0 to 60 seconds.


I/O Protection
 It is the mechanism that protect the I/O devices.

 To protect the I/O and hardware we must bound user


functionality by implementing a mechanism is called Dual
protection
 In dual protection categorized system functionality into
two parts.
 Monitor mode and User mode:

 Monitor mode only allow the service of OS. while User


mode allow all the services related to user.
Need of protection in operating
system.
 There may be security risks like unauthorized reading, writing,
modification, or preventing the system from working effectively for
authorized users.
 It helps to ensure data security, process security, and program
security against unauthorized user access.
 It is important to ensure that no viruses, no unauthorized access to
the existing data.
 Its purpose is to ensure that only the systems' policies access
programs, resources, and data.
Techniques of protection

 Authentication
 One-time password
 Encrypted password
Authentication:

 It deals with defining every consumer in the system


and ensuring that they are who they claim to be .

 The operating system ensure that before they enter the


system all user are authenticated.
One-time password

 For authentication purpose these passwords provides a lot


of protection.

 Any time a user wants to access the system a one-time


password can be created exclusively for a login.

 It is not possible to use more than once.


Encrypted password:

 It is also a very effective technique of authentication


access.

 Encrypted data is passed network which transfers


and checks password allowing data to pass without
interrupt intercept.
Advantages

 Helps protect your system and personal files.

 A restore point allows you to restore the system to a previous state


should something go wrong with a change that’s been made.

 This maintenance is controlled by limiting the space they occupy to


between 3% and 5% (to a maximum of 10 GB) of your disk.
Disadvantages

 If you turn off System Protection, all existing restore points are
deleted.

 If you have Windows booted in Safe Mode, then you will not be
able to turn on or off.

 System protection can only be turned on for drives that are


formatted using the NTFS file system.

You might also like