OS 8 Nov Protection & Security in OS

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 7

Protection & Security in Operating system

The main difference between protection and security is that the


protection focuses on internal threats in a computer system while
security focuses on external threats to a computer system.

Protection involves guarding the user’s programs and data by


interference from other authorized users of the system. Security
involves guarding the user’s programs and data against interference by
external entities such as unauthorized users of other systems.
What is Protection
Protection deals with the internal threats of the system.
Example:
There are four users in a computer system: u1, u2, u3, and u4 and two
resources: r1 and r2.
The user u1 and u2 can only access r1 resource. The user u3 and u4 can
only access r2 resource.
If the user u3 tries to access resource r1, that user is prevented from
accessing that resource. Protection technique handles these internal
threats.
What is Security

Security deals with the external threats to the computer system.


Example:
There is an external user x who is from some other computer.
This user is trying to access the resources r1 and r2.
Since r1 and r2 are internal resources, the external user is prevented
from accessing them. Security techniques handle these external
threats.
Security (Cont..)
Security is defined by three attributes:
• Confidentiality: It is the prevention of unauthorized modification of information and
resources.
• Integrity: It is the prevention of unauthorized users.
• Availability: It is the prevention of unauthorized withholding of information or
resources.
The external threats can be of two types :
• Direct threats: A direct threat is an attack on the system from a hacker or a
disgruntled insider.
• Indirect threats: An indirect threat is a random attack such as a computer virus, worm,
Trojan horse, etc.
Threats
A threat is a program that is malicious in nature and leads to harmful effects for the system.
Some of the common threats that occur in a system are −

Virus: Viruses are generally small snippets of code embedded in a system. They are very
dangerous and can corrupt files, destroy data, crash systems etc. They can also spread further by
replicating themselves as required.
Trojan Horse: A trojan horse can secretly access the login details of a system. Then a malicious
user can use these to enter the system as a harmless being and wreak havoc.
Trap Door: A trap door is a security breach that may be present in a system without the
knowledge of the users. It can be exploited to harm the data or files in a system by malicious
people.
Worm: A worm can destroy a system by using its resources to extreme levels. It can generate
multiple copies which claim all the resources and don't allow any other processes to access
them. A worm can shut down a whole network in this way.
Denial of Service: These type of attacks do not allow the legitimate users to access a system. It
overwhelms the system with requests so it is overwhelmed and cannot work properly for other
user.
Protection & Security Methods
The different methods that may provide protect and security for different computer systems are −
• Authentication
This deals with identifying each user in the system and making sure they are who they claim to be. The
operating system makes sure that all the users are authenticated before they access the system. The different
ways to make sure that the users are authentic are:
• Username/ Password
Each user has a distinct username and password combination and they need to enter it correctly before they can
access the system.
• User Key/ User Card
The users need to punch a card into the card slot or use they individual key on a keypad to access the system.
• User Attribute Identification
Different user attribute identifications that can be used are fingerprint, eye retina etc. These are unique for each
user and are compared with the existing samples in the database. The user can only access the system if there is
a match.

You might also like