Os Cha 6
Os Cha 6
We say that the system is secure if its resources are used and accessed
as intended under all circumstances.
The Security Problem…
Unfortunately total security cannot be achieved.
2. Internal Authentication
Sharing parameters
Confinement
Allocating rights
Trojan horse
System protection, authentication
System Protection is especially important in a multiuser environment
when multiple users use computer resources such as CPU, memory,
etc.
It is the operating system's responsibility to offer a mechanism that
protects each process from other processes.
In a multiuser environment, all assets that require protection are
classified as objects, and those that wish to access these objects are
referred to as subjects.
The operating system grants different access rights to different
subjects.
System protection, authentication…
System protection allows multiple users to safely share a common
logical namespace, including a directory or files.
It needs the protection of computer resources like the software,
memory, processor, etc.
Users should take protective measures as a helper to
multiprogramming OS so that multiple users may safely use a
common logical namespace like a directory or data.
Protection may be achieved by maintaining confidentiality, honesty
and availability in the OS.
It is critical to secure the device from unauthorized access, viruses,
worms, and other malware.
Models of protection
• Active parts (e.g. processes or threads) are called subjects and act on behalf
of users.
• Passive parts (i.e. resources) are called objects.
• The particular set of rights a process has at any given time is referred to as
its protection domain.
• A subject is a process executing in a specific protection domain.
• A protection system is composed of a set of objects, a set of subjects, and a
set of rules specifying the protection policy.
• What mechanism to implement different security policies for subjects to
access objects
Many different policies must be possible
Policy may change over time
Memory protection
One of the important aspects of Operating system security is Memory
Protection.
Memory provides powerful indirect way for an attacker to circumvent
security mechanism, since every piece of information accessed by any
program will need to reside in memory at some point in time, and
hence may potentially be accessed in the absence of memory
protection mechanisms.
Memory protection is a way for controlling memory usage on a
computer, and is core to virtually every operating system.
Memory protection…
• Its main purpose is to prevent a process running on an operating
system from accessing the memory of other processes, or is used by
the OS kernel.
• This prevents a bug within the process from affecting other processes,
and also prevents malicious software from gaining unauthorized
access to the system, e.g., suppose that process A is permitted access to
a file F, while process B is not.
Memory protection…
• Process B can bypass this policy by attempting to read F's content that
will be stored in A's memory immediately after A reads F.
It monitors and logs all connections and limits network access between
these two security domains.