Unit 4 Protection and Security
Unit 4 Protection and Security
Introduction
Protection and security requires that
computer resources such as CPU, software,
memory etc. are protected.
This extends to the operating system as well
as the data in the system.
This can be done by ensuring integrity,
confidentiality and availability in the
operating system.
The system must be protect against
unauthorized access, viruses, worms etc.
Confidentiality
means that your information can be seen only
by you and those that you want to see the
information.
Integrity
involves making sure that your information
cannot be changed or removed without your
authorization.
Availability
Ensures that you can get to your information
when you need it.
Need for security
Security of a computer system is a crucial task. It is a
process of ensuring confidentiality and integrity of the
OS.
Security refers to providing a protection system to
computer system resources such as CPU, memory,
disk, software programs and most importantly
data/information stored in the computer system.
If a computer program is run by an unauthorized user,
then he/she may cause severe damage to computer or
data stored in it.
So a computer system must be protected against
unauthorized access, malicious access to system
memory, viruses, worms etc.
Program Threats
Operating system's processes and kernel do
the designated task as instructed.
If a user program is altered and further used
to perform some malicious unwanted task ,
then it is known as Program Threats
One of the common example of program
threat is a program installed in a computer
which can store and send user credentials via
network to some hacker.
Following is the list of some well-known program threats.
Virus − Virus as name suggest it is a self-replicating that attaches
itself to a system file on computer system. They are highly
dangerous and can modify/delete user files, crash systems. A virus is
generally a small code embedded in a program. As user accesses the
program, the virus starts getting embedded in other files/ programs
and can make system unusable for user
Trojan Horse − A code segment that misuses its environment is
called Trojan Horse.Such program traps user login credentials and
stores them to send to malicious user who can later on login to
computer and can access system resources.
Trap Door − If a program which is designed to work as required,
have a security hole in its code and perform illegal action without
knowledge of user then it is called to have a trap door.