Unit 6
Unit 6
Goals of Protection
Protection is especially important in a multiuser environment when multiple users use
computer resources such as CPU, memory, etc. It is the operating system's responsibility to
offer a mechanism that protects each process from other processes.
Various goals of protection in the operating system are as follows:
The policies define how processes access the computer system's resources, such as
the CPU, memory, software, and even the operating system. It is the responsibility of
Principles of Protection
Programs, users and systems should be given just enough privileges to perform their tasks
This ensures that failures do the least amount of harm and allow the least of harm to be done.
For example, if a program needs special privileges to perform a task, it is better to make it a
SGID (Set Group ID up on execution) program with group ownership of "network" or
"backup" or some other pseudo group, rather than SUID (Set-user Identification) with root
ownership. This limits the amount of damage that can occur if something goes wrong.
Typically, each user is given their own account, and has only enough privilege to modify their
own files.
The root account should not be used for normal day to day activities – The System
Administrator should also have an ordinary account, and reserve use of the root account for
only those tasks which need the root privileges
Security Problem
The process of ensuring OS availability, confidentiality, integrity is known as operating
system security. OS security refers to the processes or measures taken to protect the
operating system from dangers, including viruses, worms, malware, and remote hacker
intrusions. Operating system security comprises all preventive-control procedures that
protect any system assets that could be stolen, modified, or deleted if OS security is breached.
Security refers to providing safety for computer system resources like software, CPU,
memory, disks, etc. It can protect against all threats, including viruses and unauthorized
access.
Program Threats
A program threat is a program written to hijack the security or change the behaviour of the
process.
User Authentication
The user authentication process is used just to identify who the owner is or who the
identified person is. On a personal computer, generally, user authentication can be
performed using a password.
When a computer user wants to log into a computer system, the operating system (OS)
installed on that computer system generally wants to determine or check who the user is.
This process is called "user authentication."
It is sometimes critical to authenticate the user because the computer system may contain
sensitive information about the owner.
The user can be authenticated in one of the following ways:
User authentication using a password
User authentication using a physical object
User authentication using biometrics
User authentication using countermeasures