0% found this document useful (0 votes)
1 views

Module-7-Protection-and-Security-of-Operating-System

The document discusses the concepts of protection and security in operating systems, highlighting their roles in managing internal and external threats to system resources. Protection focuses on controlling access to processes and user resources, while security addresses unauthorized access and harmful modifications. It also outlines common threats, such as viruses and Trojans, and methods to ensure protection and security, including data backups and secure authentication.

Uploaded by

ellexbeige
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Module-7-Protection-and-Security-of-Operating-System

The document discusses the concepts of protection and security in operating systems, highlighting their roles in managing internal and external threats to system resources. Protection focuses on controlling access to processes and user resources, while security addresses unauthorized access and harmful modifications. It also outlines common threats, such as viruses and Trojans, and methods to ensure protection and security, including data backups and secure authentication.

Uploaded by

ellexbeige
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Protection and Security

in Operating System
Lesson 7
🠺

Overview
🠺

Operating systems manage both logical and physical resources to


prevent interference with each other and unauthorized access from
external sources. These methods are categorized as protection and
security in the operating system. Computing resources, such as CPUs,
disks, and memory, are secured and protected by this management.
This can be accomplished by assuring the operating system's,
confidentiality, availability, and integrity. Unauthorized access, viruses,
worms, and other threats must be prevented from entering the system.
T

T What is Protection and Security in Operating


🠺

🠺 Systems?
🠺

🠺
Protection
❑ Protection tackles the system's internal threats. It provides a mechanism for
controlling access to processes, programs, and user resources. In simple
words, It specifies which files a specific user can access or view and modify to
maintain the proper functioning of the system. It allows the safe sharing of
common physical address space or common logical address space which
means that multiple users can access the memory due to the physical
address space.
T

T What is Protection and Security in Operating


🠺

🠺 Systems?
🠺

🠺
Security
Security tackles the system's external threats. The safety of their
system resources such as saved data, disks, memory, etc. is secured
by the security systems against harmful modifications,
unauthorized access, and inconsistency. It provides a
mechanism (encryption and authentication) to analyze the user
before allowing access to the system.
🠺

🠺 Difference between Protection and Security


🠺

🠺
Protection Security
Protection deals with who has Security gives the system access
access to the system resources. only to authorized users.
Protection tackles the Security tackles the
system's internal threats. system's external threats.
Protection addresses simple More complex queries are
queries. addressed in security.
It specifies which files a specific It defines who is permitted to
user can access or view and modify. access the system.
Encryption and certification
An authorization mechanism is used
(authentication) mechanisms are
in protection.
implemented.
While security provides a
Protection provides a mechanism
mechanism to safeguard the system
for controlling access to processes,
resources and the user resources
programs, and user resources.
from all external users.
T

T
🠺

🠺 Threats to Protection and Security


🠺

🠺
A program that is malicious in nature and has harmful impacts on a system is
called a threat. Protection and security in an operating system refer to the
measures and procedures that can ensure the confidentiality, integrity,
and availability (CIA) of operating systems. The main goal is to protect the
OS from various threats, and malicious software such as trojans, worms,
and other viruses, misconfigurations, and remote intrusions.
T

T Common Threats That Occur in a System


2 🠺

🠺 Trojan Horse
🠺

🠺
Virus A Trojan Horse Virus is a form of Denial of Service
malware that downloads on a
A computer virus is a form of computer by impersonating a A Denial-of-Service
malware, or malicious software, trustworthy program. A Trojan horse (DoS) attack aims to
that transmits between can get unauthorized access to a shut down a computer
computers and corrupts software system's login information. system or network so
and data. that its intended users
are unable to access it.
Worm Trap Door These kinds of attacks
A computer worm is a sort of malware A trap door is basically a back door into prevent authorized
whose main purpose is to keep operating software that anyone can use to access users from accessing a
on infected systems while self-replicating any system without having to follow the system.
and infecting other computers. By using a normal security access procedures. It
system's resources to extreme levels, a may exist in a system without the user's
worm can completely destroy it. knowledge.
T

T Methods to Ensure Protection and Security in


5 🠺
Operating System
🠺
🠺

🠺
1 4

Keep a Data Backup Use Secure Wi-Fi Only

2 5

Install anti-virus and malware


Beware of suspicious emails and links
protection

3 6

Secure Authentication and


Manage access wisely
Authorization
T

T Methods to Ensure Protection and Security in


5
Operating System

Firewalls Utilities

Encryption and Decryption Based


transfer

Be cautious when sharing personal


information
🠺

🠺
🠺

THANK YOU!
ENGR. ARNOLD F. REANO
Instructor I - BSCpE Program

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy