Download Operating Systems 4

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Information security wikipedia , lookup

Access control wikipedia , lookup

Malware wikipedia , lookup

Trusted Computing wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Mobile security wikipedia , lookup

Hacker wikipedia , lookup

Security-focused operating system wikipedia , lookup

Computer security wikipedia , lookup

Unix security wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Operating system
Part four
Introduction to computer, 2nd semester, 2010/2011
Mr.Nael Aburas [email protected]
Faculty of Information Technology
Islamic University of Gaza
Security
The security of a computer system
requires a well-designed operating
system.
 The security takes multiple forms; for
example: reliability (no fail). If a flaw in the
file manager causes the loss of part of a
file, then the file was not secure.

Attacks from the outside

An important task performed by operating system is to
protect the computer’s resources from any
unauthorized access.
◦ Establishing accounts for each user by the administrator
(username, password and privileges)
◦ The OS use this information during each login procedure.
◦ The administrator(highly privileged) is able to monitor activity
within the computer system in an effort to detect destructive
behavior.
◦ To assist in this; Some software (auditing software), record and
then analyze the activities taking place within the computer
system.
 Incorrect passwords.
 Sniffing software ( software that records activities and later reports
them to intruder)
security

One of the major obstacles to the
security of computer systems is the
carelessness of the users themselves.
◦ Easy to guess password
◦ Share password with friends
Attacks from within



Once an intruder gain access to a computer
system, the next step is to explore, looking
for information or for places to insert
destructive software.
The intruder may try to trick the memory
manager into allowing a process to access
main memory cells outside its allotted area.
Or may try to trick the file manager into
retrieving files whose access should be
denied.
security

To protect against such actions, CPUs are
designed to operate in one of two
privilege levels:
◦ Privileged mode
◦ Non-privileged mode

Privileged mode: the CPU is able to
execute all the instructions in its machine
language

Non-privileged mode: the list of acceptable
instructions is limited.
security




The instructions that are available only in privileged
mode are called privileged instructions.
An attempt to execute a privileged instruction when
the CPU is in non-privileged mode causes an interrupt.
This interrupt convert the CPU to privileged mode.
When first turned on, the CPU is in privileged mode.
Thus, when the OS starts at the end of the boot
process, all instructions are executable. However, each
time the OS allows a process to start a time slice, it
switches the CPU to non-privileged mode by executing
a “change privilege mode” instructinos.
security





Privileged instructions and the control of privilege levels is
the major tools available to OS for maintaining security.
A single flaw in privilege level control can open the door to
disaster.
If a process is allowed to alter the timer that controls the
system’s multiprogramming system, that process can extend
its time slice and dominate the machine.
If a process is allowed to access peripheral devices directly,
then it can read files without supervision by the system’s file
manager.
If a process is allowed to access memory cell outside its
allotted area, it can read and even alter data being used by
other process.