0% found this document useful (0 votes)
17 views25 pages

Operating System Security

Uploaded by

Gemeda Abugare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views25 pages

Operating System Security

Uploaded by

Gemeda Abugare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

OROMIA STATE UNIVERSITY

System Security and Protection

Course Name Operating


system
NAME ID
1) Elsabet Brhanu 01004
2) Fenet Roba 01005
3) Gelasa Urgi 01006
4) Natnael Alemayew 01013 Instructor Name by EFGNY .student
5) Yenatfenta Andualem 01018
1
operating System Security
 What is Operating System Security?
 Importance of Operating System Security
 Security Threats and Attacks

Operating System Security Policies and Mechanisms


 Operating System Security Policies
 Operating System Mechanisms

Operating System Protection and Authentication


 System Protection
 Authentication Methods

2
Models of Protection
Memory Protection
 What is Memory Protection
 Why Memory Protection is Needed
 Memory Protection Techniques

Encryption
 What is Encryption?
 Why is encryption needed?

3
 Types of Encryption
Symmetric Encryption
Asymmetric Encryption
 Which Encryption is Fastest?

Recovery Management
 Importance of Data Recovery

4
Overview of System Security

System security refers to the set of policies, mechanisms, and measures


implemented to protect computer systems and their resources from unauthorized
access, attacks, and damage.
It involves ensuring the confidentiality, integrity, and availability of information and
resources within a system.

• protection and security are vital to computer systems.


We distinguish between these two concepts in the following way:

5
•Security is a method user in operating systems that handles the threats from
outside of the system
Its focused in externals threads of the system
•Protection is the set of mechanisms that control the access of processes and
users to the resources defined by a computer systems
It focused for internal threads to the systems

6
What Operating is System Security?

The process of ensuring OS availability, confidentiality, integrity is known


as operating system security. OS security refers to the processes taken to
protect the operating system from dangers, including viruses, worms,
malware, and remote hacker intrusions. Operating system security
comprises all preventive-control procedures that protect any system assets
that could be stolen, modified, or deleted if OS security is breached.

7
Importance of Operating System Security

 Protects Your Data:


 Maintains System Stability:
 Ensures System Integrity:
 Blocks Unauthorized Access:

Operating System Security Threats and Attacks


operating systems are vulnerable to various security threats and attacks that can compromise
the confidentiality, integrity, and availability of data.

8
Security Threats

The external threats can be of two types


A direct threat : is attack on the system from a hacker
An indirect threat :is random attack such as computer virus ,worm etc.

9
Operating system Security Policies and Mechanisms

 Policies : decide what will be done;


 Mechanisms: decide how to do something.

Operating system security policies are rules and settings that control how your computer
or device behaves and interacts with other devices, networks, and users. They can help you
protect your data from unauthorized access, theft, or loss, as well as improve your
performance and productivity.

How We Apply Operating System Security Policies


10
we will learn how to apply some common operating system policies

1, User accounts and passwords


2, Encryption and backup
3, Firewall and antivirus
4, Updates and patches
5, Privacy and permissions
Operating System security Mechanisms
operating system security mechanisms: are tools and features that protect the operating
system from security threats. They include access controls, user account management,
firewalls, intrusion detection systems, encryption, antivirus software
11
Operating System Protection and Authentication

 System protection in an operating system refers to the mechanisms implemented


by the operating system to ensure the security and integrity of the system. System
protection involves various techniques to prevent unauthorized access, misuse, or
modification of the operating system and its resources
• There are several ways in which an operating system can provide system protection
 User authentication:The operating system requires users to authenticate
themselves before accessing the system. Usernames and passwords are commonly
used for this purpose.

12
 Access control:The operating system uses access control
lists (ACLs) to determine which users or processes have
permission to access specific resources or perform specific
actions.
 Encryption:The operating system can use encryption to
protect sensitive data and prevent unauthorized access.
 Firewall: A firewall is a software program that controls incoming and
outgoing network traffic based on predefined security rules.

13
 Authentication :is refers to identifying each user of the systems
associating
Exciting program (permission) for those users
How we identify the users
 Password based : the users need to entered and registered user name and
passwords with operating system to login in to the system
 Artificial based /user card /key :users need to punch card in the card slot
or enter the key generated by key generators to login in to the system
 User attributes : user need to pass his/her attributes via design input device
using by os to login the systems
 e.g. user fingerprint, eyes retina, patterns, signature etc.. 14
Models of Protection
A "model of protection" refers to a framework that defines how a system controls access
to resources and information.
These frameworks establish rules for who (users, processes) can access what (files, data,
programs) and how (read, write, execute).
Models of Protection Categories :
• access Control Models : These models focus on who can access resources.
• Capability-Based Security: This model focuses on how access is granted, using
special tokens (capabilities) to control access.

15
•Ring-Based Protection & Virtualization-Based Security: These models focus
on isolating resources and processes from each other based on privilege levels or
creating virtual environments.

16
Memory Protection

 What is Memory Protection : is preventing one program from affecting the memory of
other programs
Need of Memory protection:

Prevents program chaos: Imagine programs stepping on each other's toes in memory,
corrupting data and causing crashes. Memory protection keeps them separated, like having
their own playgrounds.
System stability: By ensuring programs don't clash in memory, it creates a smoother and
more reliable computing experience.

17
Memory Protection Techniques : There are various methods for protecting a process from
accessing memory that has not been allocated and some of the commonly used methods
are given below:

18
Encryption

Encryption : is a form of data security in which information is converted to cipher


text.
Only authorized people who have the key can decipher the code and access the
original plaintext information.
Why is encryption needed?
Encryption helps to protect private data, sensitive information, and can improve the
security of communication between client and servers.

19
 Types of Encryption:
there are two types of Encryption

 Asymmetric Encryption: Asymmetric encryption, also known as public-key


cryptography, is a type of encryption that uses a pair of keys to encrypt and decrypt
data
 Symmetric Encryption: When the plaintext is encrypted and decrypted using the
same key, it is know as symmetric encryption. It is also known as “shared-key” or
“private-key” Encryption.
Symmetric encryption is much faster then asymmetric encryption.

20
asymmetric encryption vs symmetric encryption

21
Recovery Management

Recovery Management in operating systems is a critical feature that allows users


to restore their system to a previous state in case of failure or issues.
• It using To provide a safety net for system failures, allowing restoration to a
functional state.
• How can use Recovery Management technics?
Includes tools like System Restore, which can roll back system files, settings, and
applications to a previous point in time.

22
Importance of Data Recovery :Data recovery is important
for preventing data loss, preserving business continuity, protecting
sensitive information, complying with regulations, retrieving personal
memories, minimizing financial losses, and maintaining trust with
stakeholders.

23
SUMMARISE
System Security: Measures to protect a computer system or network.

Policies and Mechanism: Statements of what is allowed and methods for enforcing these policies.

System Protection, Authentication: Verifying a user’s identity to ensure only authorized people have

access.

Models of Protection: Frameworks for managing access and protecting resources.

Memory Protection: Control of memory access rights to prevent a process from accessing unallocated

memory.

Encryption: Encoding information to protect data and systems from unauthorized access.

Recovery Management: Organizing treatment and recovery supports to enhance recovery initiation and 24
Thank you!
Question
n
g estio
Sug

References“ Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin”
“Introduction to Computer Security” by Goodrich and Tamassia.
www.geeksforgeeks.org
Ramwsh upadhaya b.sc (computer science ) S.c.s(A) college puri

25

You might also like