Operating System Security
Operating System Security
2
Models of Protection
Memory Protection
What is Memory Protection
Why Memory Protection is Needed
Memory Protection Techniques
Encryption
What is Encryption?
Why is encryption needed?
3
Types of Encryption
Symmetric Encryption
Asymmetric Encryption
Which Encryption is Fastest?
Recovery Management
Importance of Data Recovery
4
Overview of System Security
5
•Security is a method user in operating systems that handles the threats from
outside of the system
Its focused in externals threads of the system
•Protection is the set of mechanisms that control the access of processes and
users to the resources defined by a computer systems
It focused for internal threads to the systems
6
What Operating is System Security?
7
Importance of Operating System Security
8
Security Threats
9
Operating system Security Policies and Mechanisms
Operating system security policies are rules and settings that control how your computer
or device behaves and interacts with other devices, networks, and users. They can help you
protect your data from unauthorized access, theft, or loss, as well as improve your
performance and productivity.
12
Access control:The operating system uses access control
lists (ACLs) to determine which users or processes have
permission to access specific resources or perform specific
actions.
Encryption:The operating system can use encryption to
protect sensitive data and prevent unauthorized access.
Firewall: A firewall is a software program that controls incoming and
outgoing network traffic based on predefined security rules.
13
Authentication :is refers to identifying each user of the systems
associating
Exciting program (permission) for those users
How we identify the users
Password based : the users need to entered and registered user name and
passwords with operating system to login in to the system
Artificial based /user card /key :users need to punch card in the card slot
or enter the key generated by key generators to login in to the system
User attributes : user need to pass his/her attributes via design input device
using by os to login the systems
e.g. user fingerprint, eyes retina, patterns, signature etc.. 14
Models of Protection
A "model of protection" refers to a framework that defines how a system controls access
to resources and information.
These frameworks establish rules for who (users, processes) can access what (files, data,
programs) and how (read, write, execute).
Models of Protection Categories :
• access Control Models : These models focus on who can access resources.
• Capability-Based Security: This model focuses on how access is granted, using
special tokens (capabilities) to control access.
15
•Ring-Based Protection & Virtualization-Based Security: These models focus
on isolating resources and processes from each other based on privilege levels or
creating virtual environments.
16
Memory Protection
What is Memory Protection : is preventing one program from affecting the memory of
other programs
Need of Memory protection:
Prevents program chaos: Imagine programs stepping on each other's toes in memory,
corrupting data and causing crashes. Memory protection keeps them separated, like having
their own playgrounds.
System stability: By ensuring programs don't clash in memory, it creates a smoother and
more reliable computing experience.
17
Memory Protection Techniques : There are various methods for protecting a process from
accessing memory that has not been allocated and some of the commonly used methods
are given below:
18
Encryption
19
Types of Encryption:
there are two types of Encryption
20
asymmetric encryption vs symmetric encryption
21
Recovery Management
22
Importance of Data Recovery :Data recovery is important
for preventing data loss, preserving business continuity, protecting
sensitive information, complying with regulations, retrieving personal
memories, minimizing financial losses, and maintaining trust with
stakeholders.
23
SUMMARISE
System Security: Measures to protect a computer system or network.
Policies and Mechanism: Statements of what is allowed and methods for enforcing these policies.
System Protection, Authentication: Verifying a user’s identity to ensure only authorized people have
access.
Memory Protection: Control of memory access rights to prevent a process from accessing unallocated
memory.
Encryption: Encoding information to protect data and systems from unauthorized access.
Recovery Management: Organizing treatment and recovery supports to enhance recovery initiation and 24
Thank you!
Question
n
g estio
Sug
References“ Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin”
“Introduction to Computer Security” by Goodrich and Tamassia.
www.geeksforgeeks.org
Ramwsh upadhaya b.sc (computer science ) S.c.s(A) college puri
25