0% found this document useful (0 votes)
11 views13 pages

OS Slide

The document discusses security and protection mechanisms in operating systems, focusing on both external threats like malware and phishing, and internal threats such as unauthorized access and privilege escalation. It outlines various security mechanisms including authentication, access control, and firewalls, as well as security models like Bell-LaPadula and Biba. The conclusion emphasizes the importance of strong security measures to protect systems from cyber threats and ensure data integrity and availability.

Uploaded by

bidyuth2019
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views13 pages

OS Slide

The document discusses security and protection mechanisms in operating systems, focusing on both external threats like malware and phishing, and internal threats such as unauthorized access and privilege escalation. It outlines various security mechanisms including authentication, access control, and firewalls, as well as security models like Bell-LaPadula and Biba. The conclusion emphasizes the importance of strong security measures to protect systems from cyber threats and ensure data integrity and availability.

Uploaded by

bidyuth2019
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Operating System

Topic : Security and Protection in


Operating System
-------Presented By-------
Name: Md Bidyuth
Id: 212010025
Dept: CSE
Batch: 10th
Introduction
• mechanisms used to prevent unauthorized access, data
breaches, and system vulnerabilities

• Security focuses on external threats (e.g., hackers, malware).

• Protection focuses on internal threats (e.g., process isolation,


access control).
Key Security Threats in Operating Systems
External Threats (Cybersecurity Threats):

• Malware – Malicious software that can steal or corrupt data.

• Phishing Attacks – Trick users into revealing credentials.

• Brute Force Attacks – Hackers try every possible password


combination.
Key Security Threats in Operating Systems

Internal Threats (System-Level Issues)

• Unauthorized Access – Users trying to access restricted files or


processes.

• Privilege Escalation – Attackers gaining higher access permissions


than allowed.

• Buffer Overflow – Exploiting memory vulnerabilities to execute


malicious code.
Security and Protection Mechanisms in
Operating Systems
Authentication and Authorization:

• Authentication – Verifying a user’s identity

• Authorization – Determining user permissions

• Example: Using sudo in Linux allows only authorized users to


perform administrative tasks.
Security and Protection Mechanisms in
Operating Systems
Access Control Mechanisms

• Access Control Lists (ACLs)

• Role-Based Access Control (RBAC)

• Mandatory Access Control (MAC)


Security and Protection Mechanisms in
Operating Systems

Firewalls and Network Security

• Software Firewalls: Monitors incoming and outgoing network


traffic.

• Host-based Firewalls (Windows Defender, iptables in Linux)


restrict unauthorized connections.
Security Models
Bell-LaPadula (Confidentiality) – Restricts access to classified
data.

Biba Model (Integrity) – Prevents data corruption.

Clark-Wilson (Enterprise Security) – Enforces controlled access


to transactions
Advantages

Prevents cyber threats & data breaches.

Ensures system stability & performance.

Helps in regulatory compliance (ISO, GDPR).


Disadvantages

Can slow down performance

Managing access control can be complex.


Real-World Examples of OS Security
Windows Security: Windows Defender, BitLocker

Linux Security: Implements SELinux, AppArmor, iptables for firewall


protection.

MacOS Security: Gatekeeper, FileVault encryption

Android Security: Google Play Protect, Sandboxing, App


Permissions.
Conclusion
Crucial for protecting systems from cyber threats.

Using strong authentication, encryption, and access controls


ensures confidentiality, integrity, and availability.
Thank You

You might also like