Os Unit V
Os Unit V
System Protection: Goals of protection, Principles and domain of protection, Access matrix,
Access control, Revocation of access rights.
System Security: Introduction, Program threats, System and network threats, Cryptography
for security, User authentication, Implementing security defenses, Firewalling to protect
systems and networks, Computer security classification.
Need of Protection:
To prevent the access of unauthorized users and
To ensure that each active programs or processes in the system uses resources only as the stated
policy,
To improve reliability by detecting latent errors.
Role of Protection:
The role of protection is to provide a mechanism that implement policies which defines the
uses of resources in the computer system. Some policies are defined at the time of design of the
system, some are designed by management of the system and some are defined by the users of the
system to protect their own files and programs.
Every application has different policies for use of the resources and they may change over
time so protection of the system is not only concern of the designer of the operating system.
Application programmer should also design the protection mechanism to protect their system
against misuse.
Policy is different from mechanism. Mechanisms determine how something will be done
and policies determine what will be done.Policies are changed over time and place to place.
Separation of mechanism and policy is important for the flexibility of the system.
Protection is especially important in a multiuser environment when multiple users use
computer resources such as CPU, memory, etc. It is the operating system's responsibility to offer a
mechanism that protects each process from other processes. In a multiuser environment, all assets that
require protection are classified as objects, and those that wish to access these objects are referred to
as subjects. The operating system grants different 'access rights' to different subjects.
Domain of Protection
Various domains of protection in operating system are as follows:
1. The protection policies restrict each process's access to its resource handling. A process is
obligated to use only the resources necessary to fulfil its task within the time constraints and
in the mode in which it is required. It is a process's protected domain.
2. Processes and objects are abstract data types in a computer system, and these objects have
operations that are unique to them.
3. Each domain comprises a collection of objects and the operations that may be implemented
on them. A domain could be made up of only one process, procedure, or user. If a domain is
linked with a procedure, changing the domain would mean changing the procedure ID.
Objects may share one or more common operations.