0% found this document useful (0 votes)
7 views14 pages

10th Lecture OS

Uploaded by

farwakhalid146
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views14 pages

10th Lecture OS

Uploaded by

farwakhalid146
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Operating System

CS(407)

Lecture 10
System protection

Instructor
Sibgha Zia
Department of Computer Science
UAF Sub Campus Burewala
Introduction

• Protection refers to a mechanism which controls the access of


programs, processes, or users to the resources defined by a
computer system.
• A computer system is a collection of processes and objects .By
objects, we mean both hardware objects ( such as the CPU,
printer)and software objects ( such as files, programs).
• Each object has a unique name that differentiates it from all
other objects in the system .
The Protection Mechanism

 Distinguish between the authorized and unauthorized


usage.

 Specify the controls to be imposed.

 Provide a means of enforcement.


Types of system Protection.

 Memory Protection
 CPU Protection
 I/O Protection
Memory Protection
To protect the memory from illegal jumping of instruction we need some
protection method. base limit register and memory key.

Base Limit Register:


 the simplest method of memory protection is adding two register in CPU "Base“
and "Limit" that demonstrate a range of memory to which valid references can
be made.
 Reference out side the range cause a trap to the OS.
 Base address indicate the starting address of the process
Limit indicate the size of process.

Memory protection:
 It is used in IBM 360 OS
 It is a memory protection method in which we breakup all of the memory into
2kb pages and assign 4 bit key to each.
CPU Protection.

 To protect the CPU for the problem such as illegal execution of instruction
going to infinite time mechanism is used.

 Time start the functioning 0 to 60 seconds.


I/O Protection
 It is the mechanism that protect the I/O devices.

 To protect the I/O and hardware we must bound user


functionality by implementing a mechanism is called Dual
protection
 In dual protection categorized system functionality into
two parts.
 Monitor mode and User mode:

 Monitor mode only allow the service of OS. while User


mode allow all the services related to user.
Need of protection in operating
system.
 There may be security risks like unauthorized reading, writing,
modification, or preventing the system from working effectively for
authorized users.
 It helps to ensure data security, process security, and program
security against unauthorized user access.
 It is important to ensure that no viruses, no unauthorized access to
the existing data.
 Its purpose is to ensure that only the systems' policies access
programs, resources, and data.
Techniques of protection

 Authentication
 One-time password
 Encrypted password
Authentication:

 It deals with defining every consumer in the system


and ensuring that they are who they claim to be .

 The operating system ensure that before they enter the


system all user are authenticated.
One-time password

 For authentication purpose these passwords provides a lot


of protection.

 Any time a user wants to access the system a one-time


password can be created exclusively for a login.

 It is not possible to use more than once.


Encrypted password:

 It is also a very effective technique of authentication


access.

 Encrypted data is passed network which transfers


and checks password allowing data to pass without
interrupt intercept.
Advantages

 Helps protect your system and personal files.

 A restore point allows you to restore the system to a previous state


should something go wrong with a change that’s been made.

 This maintenance is controlled by limiting the space they occupy to


between 3% and 5% (to a maximum of 10 GB) of your disk.
Disadvantages

 If you turn off System Protection, all existing restore points are
deleted.

 If you have Windows booted in Safe Mode, then you will not be
able to turn on or off.

 System protection can only be turned on for drives that are


formatted using the NTFS file system.

You might also like