0% found this document useful (0 votes)
15 views15 pages

Osy Report

Uploaded by

Janhavi Hude
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views15 pages

Osy Report

Uploaded by

Janhavi Hude
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Create a Report on Security mechanism of operating System

PART A - MICRO-PROJECT PROPOSAL

Title of Micro Project: Create a Report on Security mechanism of


operating System.

1. Aim / Benefits of Micro Project:

To create a detailed report on Security mechanism of Operating System.

2. Course Outcomes Integrated:

CO1. Install operating system and configure it.


CO2. Use operating system tools to perform various functions.

3. Proposed Methodology:

1. Discussion about given topic.


2. Selection about group leader and distribution of responsibilities.
3. Collection of information using different resources.
4. Analysis of information as per formats given.
5. Representation of information in required formats.

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 1 of 17


Create a Report on Security mechanism of operating System

4. Action Plan:

Name of
Planned
Sr. No. Details of activity Plan start date responsible
date
members

All group
1. Topic selection 24/07/2024 31/07/2024
members

All group
2. Discussion about topic 31/07/2024 07/08/2024
members

All group
3. Collection of information 07/08/2024 14/08/2024
members

Create Part A of All group


4. 14/08/2024 21/08/2024
micro project members

Create Part B of All group


5. 21/08/2024 04/09/2024
micro project members

Create report the of micro All group


6. 04/09/2024 04/10/2024
project members

Completion of the whole All group


7. 04/10/2024 09/10/2024
micro project members

All group
8. Presentation 09/10/2024 16/10/2024
members

Submission of the micro All group


9. 16/10/2024 23/10/2024
project members

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 2 of 17


Create a Report on Security mechanism of operating System

5. Resources Required:

Sr. No. Name of resource/material Specifications Quantity

1. Laptop/PC Dell (Intel® Pentinum® 3558U) 1

2. Software Google -
Operating System Concepts
3. Books 1
-Silberschatz, Galvin
https://en.wikipedia.org/wiki/Co
4. Reference Links -
mmand-line_interface

Names of Team Members with Enrollment No.:

Sr. No. Enrollment No. Name of team member

1. 2212280010 Hude Janhavi Ramdas

2. 2212280011 Patil Asmita Baban

3. 2212280012 Bauchkar Pranoti Suryakant

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 3 of 17


Create a Report on Security mechanism of operating System

PART B - MICRO-PROJECT REPORT

Title of Micro Project: Create a Report on Security mechanism

of operating System.

1. Rationale:

The security of an operating system (OS) is a critical aspect of any computer system, as
it provides the foundation for all applications and services. The OS is responsible for managing
system resources, controlling access to data and systems, and providing a platform for running
applications. As such, the security of the OS is essential to protecting against a wide range of
threats, including malware, unauthorized access, and data breaches. Therefore, it is essential to
implement robust security mechanisms to protect the OS, its components, and the data it
manages. This report provides an in-depth analysis of the security mechanisms employed by
modern operating systems to ensure the confidentiality, integrity, and availability of system
resources

2. Aim / Benefits of Micro Project:

Create a Report on Security mechanism of operating System.

3. Course Outcomes Integrated:

CO1. Install operating system and configure it.


CO2. Use operating system tools to perform various functions.

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 4 of 17


Create a Report on Security mechanism of operating System

4. Theory:
The history of security mechanisms in operating systems (OS) has evolved significantly
since the inception of computing. Here’s an overview of key developments:

o 1960s-1970s: Foundations of OS Security

Multics (1965): One of the first operating systems to incorporate security features. It
introduced concepts like user authentication, access control lists, and hierarchical
file permissions.
Bell-LaPadula Model (1973): Developed for the Multics system, this model
focused on maintaining confidentiality through mandatory access controls.

o 1980s: Growth of Personal Computing


Unix Security: Unix systems introduced file permissions and the concept of user
IDs, allowing for a basic form of access control.

Biba Model (1977): Focused on integrity, preventing unauthorized modification of


data.
1990s: Commercial Operating Systems and Internet Security
Windows NT (1993): Introduced a more sophisticated security model, including
support for user groups, permissions, and encryption.
Security Enhancements: The rise of the internet prompted improvements in
security protocols, including SSL/TLS for secure communication.

o 2000s: Focus on Vulnerability Mitigation

Mandatory Integrity Control: Introduced in Windows Vista to enforce integrity


levels on objects.
SELinux (2000): Implemented mandatory access controls to enhance security in
Linux environments.

o 2010s: Advanced Threats and Mitigation Strategies

Virtualization Security: As virtualization became prevalent, hypervisors introduced


new security challenges and solutions.
Sandboxing: Techniques like Chrome’s sandboxing for web applications emerged
to isolate processes and limit damage from breaches.

o 2020s: Zero Trust and Modern Approaches

Zero Trust Architecture: Emphasizing "never trust, always verify," this model has
gained traction in OS security frameworks.
Continued Focus on Privacy: With regulations like GDPR, OS designs now
increasingly incorporate privacy as a core feature.

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 5 of 17


Create a Report on Security mechanism of operating System

• Security Mechanism Of Operating System

Measures to prevent a person from illegally using resources in a computer system, or


interfering with them in any manner. These measures ensure that data and programs are used
only by authorized users and only in a desired manner, and that they are neither modified nor
denied to authorized users. Security measures deal with threats to resources that come from
outside a computer system, while protection measures deal with internal threats. Passwords are
the principal security tool.
A password requirement thwarts attempts by unauthorized persons to masquerade as
legitimate users of a system. The confidentiality of passwords is upheld by encryption.
Computer users need to share data and programs stored in files with collaborators, and here is
where an operating system’s protection measures come in.
The owner of a file informs the OS of the specific access privileges other users are to
have—whether and how others may access the file. The operating system’s protection function
then ensures that all accesses to the file are strictly in accordance with the specified access
privileges. We begin by discussing how different kinds of security breaches are carried out:
Trojan horses, viruses, worms, and buffer overflows. Their description is followed by a
discussion of encryption techniques.

Goal of Security System:

a. Integrity: Users with insufficient privileges should not alter the system’s vital files and resources,
and unauthorized users should not be permitted to access the system’s objects.

b. Secrecy: Only authorized users must be able to access the objects of the system. Not everyone
should have access to the system files

c. Availability: No single user or process should be able to eat up all of the system resources;
instead, all authorized users must have access to them. A situation like this could lead to service
denial. Malware in this instance may limit system resources and prohibit authorized processes
from using them.

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 6 of 17


Create a Report on Security mechanism of operating System

• Threats to Operating System


a. Malware: - Malware is short for malicious software and refers to any software that is designed
to cause harm to computer systems, networks, or users. Malware can take many forms. Malware
is a program designed to gain access to computer systems, generally for the benefit of some
third party, without the user’s permission.

b. Network Intrusion: - A system called an intrusion detection system (IDS) observes network
traffic for malicious transactions and sends immediate alerts when it is observed. It is software
that checks a network or system for malicious activities or policy violations. Each illegal
activity or violation is often recorded either centrally using a SIEM system or notified to an
administration.

c. Buffer Overflow Technique: - The buffer overflow technique can be employed to force a
server program to execute an intruder-supplied code to breach the host computer system’s
security. It has been used to a devastating effect in mail servers and other Web servers. The
basic idea in this technique is simple. Most systems contain a fundamental vulnerability—some
programs do not validate the lengths of inputs they receive from users or other programs.

• Mechanisms for Security of Operating System

1. Authentication: Authentication is verification of a user’s identity. Operating systems


most often perform authentication by knowledge. That is, a person claiming to be some
user X is called upon to exhibit some knowledge shared only between the OS and user X,
such as a password.

2. Encryption: Data Encryption: Protects data at rest (stored data) and in transit (data being
transmitted) using algorithms (e.g., AES, RSA). File System Encryption: Encrypts files on a
disk to prevent unauthorized access

3. Access Control: User Roles and Permissions: Assigns different levels of access based on
user roles (e.g., admin vs. standard user).
Access Control Lists (ACLs): Specify which users or groups have permissions to access
specific resources.

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 7 of 17


Create a Report on Security mechanism of operating System

4. Auditing and Monitoring


Log Files: Track system events, user activities, and access attempts for security monitoring.
Intrusion Detection Systems (IDS): Monitors network traffic and system behavior for
suspicious activities.

5. Malware Protection
Antivirus Software: Scans for and removes malicious software.
Sandboxing: Runs applications in isolated environments to prevent potential harm to the
system.

6. Patch Management
Software Updates: Regularly applies patches and updates to fix vulnerabilities in the OS and
applications

7. Kernel Security
Privilege Separation: Limits the access rights of various processes to reduce the risk of
system compromise.
Secure Boot: Ensures that the OS loads only trusted software during startup.

8. Network Security
Firewalls: Control incoming and outgoing network traffic based on predetermined
security rules.
Virtual Private Networks (VPNs): Secure remote access to the network

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 8 of 17


Create a Report on Security mechanism of operating System

• Implementation: -

• Security Features Of The Operating System

1. Authentication and authorization mechanisms to control access to the system and its
resources :- The OS provides a range of authentication and authorization mechanisms,
including username and password, smart cards, and biometric authentication.
- plement Strong Passwords: Implement strong passwords, including password length,
complexity, and expiration.
- Implement Authentication Mechanisms: Implement authentication mechanisms, such
as username and password, smart cards, and biometric authentication

2. Access control mechanisms to regulate the actions that can be performed by users
and applications :- The OS provides a range of access control mechanisms, including
discretionary access control (DAC), mandatory access control (MAC), and role-based
access control (RBAC).

3. Encryption mechanisms to protect data in transit and at rest :- The OS provides a


range of encryption mechanisms, including symmetric and asymmetric encryption, and
secure communication protocols such as SSL/TLS.

4. Auditing and logging mechanisms to monitor and track system activity :- The OS
provides a range of auditing and logging mechanisms, including system logs, application
logs, and security logs.

5. Patch management and software update mechanisms to ensure the OS and its
components are up-to-date and secure :- : A patch management and software update
process is essential for ensuring the operating system is up-to-date and secure. The
following steps should be taken:

6. Implement Encryption and Secure Communication Protocols : Encryption and secure


communication protocols are essential for protecting data in transit and at rest. The
following steps should be taken:
- Implement Encryption: Implement encryption mechanisms, such as symmetric and
asymmetric encryption.
- Implement Secure Communication Protocols: Implement secure communication
protocols, such as SSL/TLS.

7. Continuously Monitor and Evaluate the Effectiveness of Security Measures :


Continuously monitoring and evaluating the effectiveness of security measures is essential
for ensuring the operating system remains secure. The following steps should be taken:
- Monitor Security Logs: Monitor security logs to identify potential security threats and
vulnerabilities.
- Evaluate Security Measures: Evaluate the effectiveness of security measures,
including firewalls, intrusion detection and prevention systems, and encryption
mechanisms.

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 9 of 17


Create a Report on Security mechanism of operating System

• Factors That Affect Security Mechanisms Of Operating System

I. Hardware Factors

- Processor Architecture: The processor architecture can affect the security of the OS, as
different architectures may have different security features and vulnerabilities.

- Memory: The amount and type of memory can affect the security of the OS, as insufficient
memory can lead to security vulnerabilities.

- Input/Output Devices: The security of input/output devices, such as keyboards and


displays, can affect the overall security of the OS

II. Software Factors

- Operating System Design: The design of the OS can affect its security, as a poorly
designed OS can have security vulnerabilities.

- Programming Languages: The programming languages used to develop the OS can affect
its security, as some languages may be more secure than others.

- Third-Party Software: The security of third-party software can affect the overall security of
the OS, as vulnerable software can compromise the OS.

III. Network Factors

- Network Architecture: The network architecture can affect the security of the OS, as a
poorly designed network can have security vulnerabilities.

- Network Protocols: The security of network protocols, such as TCP/IP, can affect the
overall security of the OS.

- Firewalls and Intrusion Detection Systems: The security of firewalls and intrusion
detection systems can affect the overall security of the OS.

IV. Human Factors

- User Behavior: The behavior of users can affect the security of the OS, as users may
intentionally or unintentionally compromise the OS.

- Administrator Behavior: The behavior of administrators can affect the security of the OS,
as administrators may intentionally or unintentionally compromise the OS.

- Training and Awareness: The level of training and awareness of users and administrators
can affect the security of the OS.

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 10 of 17


Create a Report on Security mechanism of operating System

V. Environmental Factors

- Physical Environment: The physical environment can affect the security of the OS, as a
poorly secured physical environment can compromise the OS.

- Power and Cooling: The reliability of power and cooling systems can affect the
security of the OS, as a failure of these systems can compromise the OS.

- Natural Disasters: Natural disasters, such as earthquakes and floods, can affect the
security of the OS, as these events can compromise the OS.

VI. Technical Factors

- Complexity: The complexity of the OS can affect its security, as a more complex OS
may have more security vulnerabilities.

- Interoperability: The interoperability of the OS with other systems can affect its
security, as a lack of interoperability can lead to security vulnerabilities.

- Scalability: The scalability of the OS can affect its security, as a scalable OS may be
more secure than a non-scalable OS.

• RECOMMENDATIONS

- Implement a robust security policy and procedure.


- Conduct regular security audits and vulnerability assessments.
- Implement a patch management and software update process.
- Use strong passwords and authentication mechanisms.
- Implement a firewall and intrusion detection and prevention system.
- Use encryption and secure communication protocols.

The security of the operating system is critical to protecting against a wide range of
threats. The OS provides a range of security features and mechanisms to achieve this goal.
However, the OS is also vulnerable to a range of security threats and vulnerabilities.
Implementing the recommendations outlined in this report can help to improve the security of
the operating system.

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 11 of 17


Create a Report on Security mechanism of operating System

5. Actual Methodology:

1) Discussion about given topic.


2) Selection about group leader and distribution of responsibilities.
3) Collection of information using different resources.
4) Analysis of information as per formats given.
5) Representation of information in required formats.
6) Preparation of project report.
7) Completion and submission of assign task.

6. Actual Resource Used:

Sr. Name of
Specifications Quantity
No. resource/material

1. Laptop/PC Dell (Intel® Pentium® 3558U) 1

2. Software Google -

Operating System Concepts


3. Books 1
-Silberschatz, Galvin

4. Reference Links https://en.wikipedia.org/wiki/security -

7. Skill developed:

1. Creativity and imagination.


2. Patience and attention to detail.
3. Communication and presentation skills
4. Ability to meet deadlines and work as part of a team.

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 12 of 17


Create a Report on Security mechanism of operating System

8. Application of Micro project:

1. Skill Development: Working on this project helps develop critical technical skills
such as command-line proficiency, scripting, and system management.

2. Problem-Solving Abilities: The project involves understanding and troubleshooting


command-line interfaces, which improves problem-solving abilities.

3. In-Depth Knowledge: It provides an opportunity to gain in-depth knowledge of


operating systems, including their history, architecture, and practical uses.

4. Practical Application: The project can involve hands-on tasks such as configuring a
command-line based OS.

5. Foundation for Further Projects: This micro project can serve as a foundation for
more advanced projects or research.

9. References:

1. Books:
Operating System Concepts –Silberschatz Galvin
Operating System-Godbole Achyut S.

2. Links:
https://en.wikipedia.org/wiki/Security-OS
https://chatgpt.com/

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 13 of 17


Create a Report on Security mechanism of operating System

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 14 of 17


Create a Report on Security mechanism of operating System

CO dept. GRWP, Tasgaon(A.Y.2023-24) Page 15 of 17

You might also like