SlideShare uma empresa Scribd logo
1 de 14
Operating system
A system having basic kernel functions of process
and memory management ,file, i/o device and
network management functions and many other
functions.
Protection of memory and resources from any
unauthorized into the PCB or resource ,or mix up of
access of one by another becomes imperative.
Introduction to OS security
issues
 The OS security issue is a critical issue.
 Each process determines whether it has a control
of a system resoure exclusively or whether it is
isolated from the other processes or whether it
shares a resource common to a set of processes.
 The OS then configures when a resource is
isolated from from one process and a resource is
shared with a defined with a define set of
processes.
 The OS should also have the flexibility to change
this configuration when needed, to full fill the
requirements all the process.
 For example, a process has 32 memory blocks at
an instance and the OS configures the system
accordingly.
 The OS should provide protection mechanism
and implement a system administration(s) –
defined security policy.
 An application software programmer can find a
hole in the protection mechanism and an
unauthorized access.
Important security issues
 Protection mechanism
 Flexibility to of change.
Control resource sharing
 Confinement mechanism
 Security policy (strategy).
 Authentication mechanism.
 Authorization.
 Encryption
Protection Mechanism
 OS should provide protection mechanisms
and implement a system administrator (s)
defined security
Flexibility to of change
 when needed to fulfill the need
requirements of all the processes.
 For example, a process has control of 32
memory blocks at an instance and the OS
configured the system accordingly. t
 Later when more processes are created, this
can be reconfigured.
Controlled resource sharing
 Controlling read and write of the resources
and parameters by user processes.
 For example, some resources write only for
a process and some read only for a set of
processes
 Another example, memory buffer to which
one process writes at an instant till that
buffer is emptied by other process
Confinement Mechanism
 Mechanism that restricts sharing of
parameters to a set of processes only .
Security Policy (Strategy)
 Rules for authorizing access to the OS,
system and information.
 A policy example is that a communication
system may having a policy of peer-to-peer
communication (connection establishment
preceding the data packets flow).
Authentication Mechanism
 External authentication mechanism for the user
and a mechanism meant to prevent an
application run unless the user registers and the
system administrator (software) authorizes
 Internal authentication for the process, and the
process should not appear (impersonate) as some
like other processes.
 User authentication can become difficult if the
user disseminates password passwords or other
authentication methods
Authorization
 User or process (s) allowed to use the
system resources as per the security policy
Encryption
 A tool to change information to make it
unusable by any other user or process unless
without the appropriate key is used for
deciphering it.
CONCLUSION
 OS security issues are important
considerations.
 Protection of memory and resources from
any unauthorized and without explicit
authorization write into the PCB or
resource
 Mix up of accesses of one by
another, becomes imperative from an OS
security and protection mechanism
Os security issues

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
 
Chapter 13 - I/O Systems
Chapter 13 - I/O SystemsChapter 13 - I/O Systems
Chapter 13 - I/O Systems
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Storage management in operating system
Storage management in operating systemStorage management in operating system
Storage management in operating system
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System Interface
 
File Protection in Operating System
File Protection in Operating SystemFile Protection in Operating System
File Protection in Operating System
 
9 virtual memory management
9 virtual memory management9 virtual memory management
9 virtual memory management
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
File system
File systemFile system
File system
 
Introduction to System Calls
Introduction to System CallsIntroduction to System Calls
Introduction to System Calls
 
Operating Systems: Device Management
Operating Systems: Device ManagementOperating Systems: Device Management
Operating Systems: Device Management
 
Problems of cooperative system
Problems of cooperative systemProblems of cooperative system
Problems of cooperative system
 
Free Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSFree Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFS
 
Operating system security
Operating system securityOperating system security
Operating system security
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 

Semelhante a Os security issues

chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mn
dejenehundaol91
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OS
C.U
 

Semelhante a Os security issues (20)

CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mn
 
ch3 - operating system structures.ppt
ch3 - operating system structures.pptch3 - operating system structures.ppt
ch3 - operating system structures.ppt
 
Operating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptxOperating Systems R20 Unit 1.pptx
Operating Systems R20 Unit 1.pptx
 
OPERATING SYSTEM PRESENTION.pdf
OPERATING SYSTEM PRESENTION.pdfOPERATING SYSTEM PRESENTION.pdf
OPERATING SYSTEM PRESENTION.pdf
 
Unit 1-Operating Systems Overview .pptx
Unit 1-Operating Systems Overview .pptxUnit 1-Operating Systems Overview .pptx
Unit 1-Operating Systems Overview .pptx
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in os
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
 
System components (os)
System components (os)System components (os)
System components (os)
 
Operating system
Operating systemOperating system
Operating system
 
Ch3
Ch3Ch3
Ch3
 
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
 
Understanding Basics of OS
Understanding Basics of OSUnderstanding Basics of OS
Understanding Basics of OS
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
OpeatingSystemPPT
OpeatingSystemPPTOpeatingSystemPPT
OpeatingSystemPPT
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01
 
Os lecture 6
Os lecture 6Os lecture 6
Os lecture 6
 
VOSUnit
VOSUnitVOSUnit
VOSUnit
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OS
 
OSCh3
OSCh3OSCh3
OSCh3
 

Mais de JOLLUSUDARSHANREDDY

Mais de JOLLUSUDARSHANREDDY (20)

RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...                                RTOS  CASE STUDY OF CODING FOR SENDING APPLIC...
RTOS CASE STUDY OF CODING FOR SENDING APPLIC...
 
MEMORY MANAGEMENT
MEMORY MANAGEMENTMEMORY MANAGEMENT
MEMORY MANAGEMENT
 
Basic functions & types of RTOS ES
Basic functions & types of  RTOS ESBasic functions & types of  RTOS ES
Basic functions & types of RTOS ES
 
RTOS LINUX2.6.X & LINUX2.6.24
 RTOS    LINUX2.6.X & LINUX2.6.24 RTOS    LINUX2.6.X & LINUX2.6.24
RTOS LINUX2.6.X & LINUX2.6.24
 
OSEK / VDX
OSEK / VDXOSEK / VDX
OSEK / VDX
 
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENTDEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
DEVICE FILE AND INPUT OUTPUT SUBSYSTEMS MANAGEMENT
 
INTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT LATENCY AND RESPONSE OF THE TASKINTERRUPT LATENCY AND RESPONSE OF THE TASK
INTERRUPT LATENCY AND RESPONSE OF THE TASK
 
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLSINTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
INTERRUPT ROUTINES IN RTOS EN VIRONMENT HANDELING OF INTERRUPT SOURCE CALLS
 
Rt linux-lab1
Rt linux-lab1Rt linux-lab1
Rt linux-lab1
 
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2RTOS MICRO CONTROLLER OPERATING SYSTEM-2
RTOS MICRO CONTROLLER OPERATING SYSTEM-2
 
WINDOWS-CE
WINDOWS-CEWINDOWS-CE
WINDOWS-CE
 
Automated system for fault analysis in industries using
Automated system for fault analysis  in industries usingAutomated system for fault analysis  in industries using
Automated system for fault analysis in industries using
 
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
 
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
 SOLAR  TRACKING  SYSTEM  BY  USING  MICROCONTROLLER SOLAR  TRACKING  SYSTEM  BY  USING  MICROCONTROLLER
SOLAR TRACKING SYSTEM BY USING MICROCONTROLLER
 
Zigbee Based Solar Light System By Using LDR
Zigbee Based Solar Light System By Using LDRZigbee Based Solar Light System By Using LDR
Zigbee Based Solar Light System By Using LDR
 
Design of smart nodes for wireless sensor network ...
Design of smart nodes for wireless sensor network                            ...Design of smart nodes for wireless sensor network                            ...
Design of smart nodes for wireless sensor network ...
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
 
BOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPSBOMB DETECTION ROBOT BY USING GSM & GPS
BOMB DETECTION ROBOT BY USING GSM & GPS
 
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFIDSTUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
STUDENT DATA LOGGING SYSTEM INTO COLLEGE WEBSITE BASED ON RFID
 
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
SOLAR BASED MOBILE CHARGER IN RURAL AREASSOLAR BASED MOBILE CHARGER IN RURAL AREAS
SOLAR BASED MOBILE CHARGER IN RURAL AREAS
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Os security issues

  • 1. Operating system A system having basic kernel functions of process and memory management ,file, i/o device and network management functions and many other functions. Protection of memory and resources from any unauthorized into the PCB or resource ,or mix up of access of one by another becomes imperative.
  • 2. Introduction to OS security issues  The OS security issue is a critical issue.  Each process determines whether it has a control of a system resoure exclusively or whether it is isolated from the other processes or whether it shares a resource common to a set of processes.  The OS then configures when a resource is isolated from from one process and a resource is shared with a defined with a define set of processes.
  • 3.  The OS should also have the flexibility to change this configuration when needed, to full fill the requirements all the process.  For example, a process has 32 memory blocks at an instance and the OS configures the system accordingly.  The OS should provide protection mechanism and implement a system administration(s) – defined security policy.  An application software programmer can find a hole in the protection mechanism and an unauthorized access.
  • 4. Important security issues  Protection mechanism  Flexibility to of change. Control resource sharing  Confinement mechanism  Security policy (strategy).  Authentication mechanism.  Authorization.  Encryption
  • 5. Protection Mechanism  OS should provide protection mechanisms and implement a system administrator (s) defined security
  • 6. Flexibility to of change  when needed to fulfill the need requirements of all the processes.  For example, a process has control of 32 memory blocks at an instance and the OS configured the system accordingly. t  Later when more processes are created, this can be reconfigured.
  • 7. Controlled resource sharing  Controlling read and write of the resources and parameters by user processes.  For example, some resources write only for a process and some read only for a set of processes  Another example, memory buffer to which one process writes at an instant till that buffer is emptied by other process
  • 8. Confinement Mechanism  Mechanism that restricts sharing of parameters to a set of processes only .
  • 9. Security Policy (Strategy)  Rules for authorizing access to the OS, system and information.  A policy example is that a communication system may having a policy of peer-to-peer communication (connection establishment preceding the data packets flow).
  • 10. Authentication Mechanism  External authentication mechanism for the user and a mechanism meant to prevent an application run unless the user registers and the system administrator (software) authorizes  Internal authentication for the process, and the process should not appear (impersonate) as some like other processes.  User authentication can become difficult if the user disseminates password passwords or other authentication methods
  • 11. Authorization  User or process (s) allowed to use the system resources as per the security policy
  • 12. Encryption  A tool to change information to make it unusable by any other user or process unless without the appropriate key is used for deciphering it.
  • 13. CONCLUSION  OS security issues are important considerations.  Protection of memory and resources from any unauthorized and without explicit authorization write into the PCB or resource  Mix up of accesses of one by another, becomes imperative from an OS security and protection mechanism