Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Security in operating Systems

Rating
-
Sold
-
Pages
11
Uploaded on
30-12-2022
Written in
2021/2022

In these notes, Covered all the topics of operating systems briefly. COs - Analyze the structure of OS and basic architectural components involved in OS design. Compare and contrast various CPU scheduling algorithms. Evaluate the requirements for the process synchronization and co-ordination in the contemporary operating system. Analyze various algorithms for memory management, I/O management and security aspects of operating system. Write shell scripts in Unix/Linux O.S and write simple programs using kernel system calls. Also understand virtualization concept

Show more Read less
Institution
Course

Content preview

8 - Security

(1) Write short note on Design Principles of Security.
Design Principles of Security
• Principles of Least Privileges:
✓ It restricts how privileges are granted.
✓ This principle states how the privileges are to be granted to a subject. A subject
should be given only those privileges that it requires for completing a task.
✓ If a subject does not need a specific right it should not be granted that right.
✓ For example, if a subject requires append rights to an object then it must be
given only the append rights and not the write rights.
• Principe of Fail Safe Defaults:
✓ It restricts how privileges are initialized when a subject or object are created.
✓ This principle states that unless the subject is given explicit access to the object
it should be denied access to that object.
✓ This means that the default access to object is none.
✓ All the access rights should be given explicitly granted.
• Principle of Economy of Mechanisms:
✓ This principle simplifies the design and implementation of security mechanisms.
✓ This principle states that security mechanism should be as simple as possible.
✓ If design is simple there are fewer chances for errors.
✓ The checking and testing procedure becomes simpler.
• Principles of Complete Mediation:
✓ This principle states that all the accesses to object be checked in order to
ensure that they are allowed.
✓ Whenever a subject attempts to read an object the OS mediate the action.
✓ First it determines if the subject is allowed to access the object.
✓ If so it provides resources for reading the object.
✓ If the subject reattempts the read operation then it checks if the subject is still
allowed to read the object and then allows for reading.
• Principle of Open Design:
✓ This principle suggests that complexity doesn’t add security.
✓ This principle states that the security of mechanism should not depend on the
secrecy of its design or implementation.
• Principles of Separation of Privileges:
✓ This principle states that the access of an object should not depend only on
fulfilling a single condition.

1

, 8 - Security
✓ There should be multiple conditions required to grant privilege and two or
more system components work together to enforce security.
• Principles of Least Common Mechanism
✓ This principle states that the amount of mechanism common to and depending
on multiple users should be kept to the minimum possible.
• Principles of user Acceptability
✓ This principle states that the mechanism used for protection should be
acceptable to the users and should be easy to use.
✓ Otherwise, the user may feel a burden to follow the protection mechanism.


(2) Explain Domain Protection mechanism in detail.
• A computer can be viewed as a collection of processes and objects (both H/W & S/W).
• Means a computer system is collections of objects and processes and these objects
and processes are needed to be protected.
• Each object has unique name by which it is referred and finite set of operations that
processes are allowed to carry out on it.
• There should be some way to prohibit processes from accessing objects that they are
not authorized to.
• Operations that are possible depend on the object.
Object Operation
CPU Execution
File Read, Write
Semaphore Up, Down
Tape Drives Read, Write,
Rewound


• It is also possible to restrict processes to carry out a subset of legal operations.
• In other words we can say that process should be able to access only those resources
that it currently requires to complete its task.
• This requirement is known as need to know principle.
Domain Structure


2

Written for

Institution
Course

Document information

Uploaded on
December 30, 2022
Number of pages
11
Written in
2021/2022
Type
Class notes
Professor(s)
Ymk sir
Contains
All classes

Subjects

$5.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
vaibhav51ppsv2020

Also available in package deal

Get to know the seller

Seller avatar
vaibhav51ppsv2020 C.K.Pithawala school of engineering and techonology
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
14
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions