SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Operating System
SECURITY
INTRODUCTION
Security of a computer system is a crucial task. It is a process of ensuring confidentiality and integrity
of the OS.
On the other hand, this requires only adequate protection system but also consideration of external
environment within which the system operates.
A system is said to be secure if its resources are used and accessed as intended under all the
circumstances.
SECURITY PROBLEM
So, How exactly this security problem occurs ?
● In large commercial systems containing payroll or other financial data are inviting targets to
thieves
● We say that a system is secure if its resources are used and accessed as intended under all
circumstances.
● So, for this we must have mechanisms to make security breaches a rare occurrence rather
than normal conditions.
SECURITY VIOLATIONS
A security violation or infraction is any breach of security regulations, requirements, procedures or guidelines,
whether or not a compromise results.
Security of a system can be threatened via two violations:
● Threat: A program which has the potential to cause serious damage to the system.
● Attack: An attempt to break security and make unauthorized use of an asset.
This System violations can be categorized into intentional and accidental.
● Intentional, A kind of harmful computer code or web script designed to create system vulnerabilities
leading to back doors and security breaches. Also known as MALICIOUS
● Accidental, on the other hand, are comparatively easier to be protected against.
○ Example: Denial of service DDoS Attack
BREACHES
Security can be compromised via any of the breaches mentioned:
● Breach of confidentiality: This type of violation involves the unauthorized reading of data.
● Breach of integrity: This violation involves unauthorized modification of data.
● Breach of availability: It involves an unauthorized destruction of data.
● Theft of service: It involves an unauthorized use of resources.
● Denial of service: It involves preventing legitimate use of the system.
As mentioned before, such attacks can be accidental in nature.
SECURITY SYSTEM GOALS
1. Integrity:
The objects in the system mustn’t be accessed by any unauthorized user & any user not having sufficient rights
should not be allowed to modify the important system files and resources.
2. Secrecy:
The objects of the system must be accessible only to a limited number of authorized users. Not everyone
should be able to view the system files.
3. Availability:
In this kind of situation, a malware might hog the resources for itself & thus preventing the legitimate
processes from accessing the system resources.
METHODS
Attackers use several standard methods in their attempts to breach the security.
● One common attack is masquerading, in which the attacker pretends to be a trusted third party. A
variation of this is the man-in-the-middle, in which the attacker masquerades as both ends of the
conversation to two targets.
● A replay attack involves repeating a valid transmission. Sometimes this can be the entire attack, (
such as repeating a request for a money transfer ), or other times the content of the original message is
replaced with malicious content.
SECURITY ATTACK
● Consider the damage that could be done if a request for authentication had a legitimate users
information replaced with an unauthorized users. yet another kind of attack is the man-in-the-middle
attack, in which an attacker sits in the data flow of a communication, masquerading as the sender to
the receiver, and vice-versa.
● In a network communication, a man-in-the-middle attack may be preceded by a session hijacking, in
which an active communication session is intercepted.
● In some cases, such as a denial-of-service attack, it is preferable to prevent the attack but sufficient to
detect the attack so that the counter measures can be taken.
several attacks are depicted in the following diagram
SECURITY MEASURES
● There are four levels at which a system must be protected:
1. Physical - The easiest way to steal data is to pocket the backup tapes. Also, access to the root console will
often give the user special privileges, such as rebooting the system as root from removable media. Even
general access to terminals in a computer room offers some opportunities for an attacker.
2. Human - There is some concern that the humans who are allowed access to a system be trustworthy, and
that they cannot be coerced into breaching security.
■ Phishing involves sending an innocent-looking e-mail or web site designed to fool people into
revealing confidential information..
■ Dumpster Diving involves searching the trash or other locations for passwords that are written
down.
■ Password Cracking involves divining users passwords, either by watching them type in their
passwords, knowing something about them like their pet's names, or simply trying all words in
common dictionaries.
SECURITY MEASURES
3. Operating System - The OS must protect itself from security breaches, such as runaway processes, memory-access
violations, stack overflow violations, the launching of programs with excessive privileges, and many others.
4. Network - As network communications become ever more important and pervasive in modern computing
environments, it becomes ever more important to protect this area of the system. This is a growing area of concern as
wireless communications and portable devices become more and more prevalent.
DIFFERENCE BETWEEN
SECURITY AND PROTECTION
SECURITY
► Security grants the system access to the
appropriate users only.
► External threats are involved.
► More convoluted queries are handled.
► Security illustrates that which person is granted for
using the system.
► Encryption and certification mechanisms are used.
PROTECTION
► While protection deals with the access to the system
resources.
► Internal threats are involved.
► Simple queries are handled.
► Whereas protection determines that what files can be
accessed or permeated by a special user.
► Authorization mechanism is implemented.
CONCLUSION
Security at the physical and human levels, although important is for the most part beyond the scope.
The security of Operating System depends on us because the more precautions we will take the more
secure our Operating System will be.
Security within the operating system and also in between the operating system is implemented in
several ways ranging from passwords of authentication through guarding against viruses to detecting
intrusions.
THANK YOU !

Más contenido relacionado

La actualidad más candente

How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
أحلام انصارى
 
Intruders
IntrudersIntruders
Intruders
techn
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 

La actualidad más candente (20)

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Network Security
Network SecurityNetwork Security
Network Security
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
System security
System securitySystem security
System security
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Computer security
Computer securityComputer security
Computer security
 
Intruders
IntrudersIntruders
Intruders
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Security & Protection in Operating System
Security & Protection in Operating SystemSecurity & Protection in Operating System
Security & Protection in Operating System
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Email security
Email securityEmail security
Email security
 
Intruders
IntrudersIntruders
Intruders
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Computer security
Computer securityComputer security
Computer security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 

Similar a OPERATING SYSTEM SECURITY

BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 

Similar a OPERATING SYSTEM SECURITY (20)

System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
System Security
System SecuritySystem Security
System Security
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Chapter-I introduction
Chapter-I introductionChapter-I introduction
Chapter-I introduction
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Information security
Information securityInformation security
Information security
 
1.pptx
1.pptx1.pptx
1.pptx
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
E sec chaptr-1
E sec chaptr-1E sec chaptr-1
E sec chaptr-1
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
 

Más de RohitK71 (11)

VIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGYVIRTUALIZATION TECHNOLOGY
VIRTUALIZATION TECHNOLOGY
 
Gram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellationsGram-Schmidt procedure and constellations
Gram-Schmidt procedure and constellations
 
Negotiation
Negotiation Negotiation
Negotiation
 
QUEUEING NETWORKS
QUEUEING NETWORKSQUEUEING NETWORKS
QUEUEING NETWORKS
 
INTEGRATION TESTING
INTEGRATION TESTINGINTEGRATION TESTING
INTEGRATION TESTING
 
INHERITANCE
INHERITANCEINHERITANCE
INHERITANCE
 
Dbms seminar
Dbms seminarDbms seminar
Dbms seminar
 
Cn application layer_paradigms
Cn application layer_paradigmsCn application layer_paradigms
Cn application layer_paradigms
 
Compiler design error handling
Compiler design error handlingCompiler design error handling
Compiler design error handling
 
Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)Computer graphics curves and surfaces (1)
Computer graphics curves and surfaces (1)
 
Usp message queues
Usp message queuesUsp message queues
Usp message queues
 

Último

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 

OPERATING SYSTEM SECURITY

  • 2. INTRODUCTION Security of a computer system is a crucial task. It is a process of ensuring confidentiality and integrity of the OS. On the other hand, this requires only adequate protection system but also consideration of external environment within which the system operates. A system is said to be secure if its resources are used and accessed as intended under all the circumstances.
  • 3. SECURITY PROBLEM So, How exactly this security problem occurs ? ● In large commercial systems containing payroll or other financial data are inviting targets to thieves ● We say that a system is secure if its resources are used and accessed as intended under all circumstances. ● So, for this we must have mechanisms to make security breaches a rare occurrence rather than normal conditions.
  • 4. SECURITY VIOLATIONS A security violation or infraction is any breach of security regulations, requirements, procedures or guidelines, whether or not a compromise results. Security of a system can be threatened via two violations: ● Threat: A program which has the potential to cause serious damage to the system. ● Attack: An attempt to break security and make unauthorized use of an asset. This System violations can be categorized into intentional and accidental. ● Intentional, A kind of harmful computer code or web script designed to create system vulnerabilities leading to back doors and security breaches. Also known as MALICIOUS ● Accidental, on the other hand, are comparatively easier to be protected against. ○ Example: Denial of service DDoS Attack
  • 5. BREACHES Security can be compromised via any of the breaches mentioned: ● Breach of confidentiality: This type of violation involves the unauthorized reading of data. ● Breach of integrity: This violation involves unauthorized modification of data. ● Breach of availability: It involves an unauthorized destruction of data. ● Theft of service: It involves an unauthorized use of resources. ● Denial of service: It involves preventing legitimate use of the system. As mentioned before, such attacks can be accidental in nature.
  • 6. SECURITY SYSTEM GOALS 1. Integrity: The objects in the system mustn’t be accessed by any unauthorized user & any user not having sufficient rights should not be allowed to modify the important system files and resources. 2. Secrecy: The objects of the system must be accessible only to a limited number of authorized users. Not everyone should be able to view the system files. 3. Availability: In this kind of situation, a malware might hog the resources for itself & thus preventing the legitimate processes from accessing the system resources.
  • 7. METHODS Attackers use several standard methods in their attempts to breach the security. ● One common attack is masquerading, in which the attacker pretends to be a trusted third party. A variation of this is the man-in-the-middle, in which the attacker masquerades as both ends of the conversation to two targets. ● A replay attack involves repeating a valid transmission. Sometimes this can be the entire attack, ( such as repeating a request for a money transfer ), or other times the content of the original message is replaced with malicious content.
  • 8. SECURITY ATTACK ● Consider the damage that could be done if a request for authentication had a legitimate users information replaced with an unauthorized users. yet another kind of attack is the man-in-the-middle attack, in which an attacker sits in the data flow of a communication, masquerading as the sender to the receiver, and vice-versa. ● In a network communication, a man-in-the-middle attack may be preceded by a session hijacking, in which an active communication session is intercepted. ● In some cases, such as a denial-of-service attack, it is preferable to prevent the attack but sufficient to detect the attack so that the counter measures can be taken. several attacks are depicted in the following diagram
  • 9.
  • 10. SECURITY MEASURES ● There are four levels at which a system must be protected: 1. Physical - The easiest way to steal data is to pocket the backup tapes. Also, access to the root console will often give the user special privileges, such as rebooting the system as root from removable media. Even general access to terminals in a computer room offers some opportunities for an attacker. 2. Human - There is some concern that the humans who are allowed access to a system be trustworthy, and that they cannot be coerced into breaching security. ■ Phishing involves sending an innocent-looking e-mail or web site designed to fool people into revealing confidential information.. ■ Dumpster Diving involves searching the trash or other locations for passwords that are written down. ■ Password Cracking involves divining users passwords, either by watching them type in their passwords, knowing something about them like their pet's names, or simply trying all words in common dictionaries.
  • 11. SECURITY MEASURES 3. Operating System - The OS must protect itself from security breaches, such as runaway processes, memory-access violations, stack overflow violations, the launching of programs with excessive privileges, and many others. 4. Network - As network communications become ever more important and pervasive in modern computing environments, it becomes ever more important to protect this area of the system. This is a growing area of concern as wireless communications and portable devices become more and more prevalent.
  • 12. DIFFERENCE BETWEEN SECURITY AND PROTECTION SECURITY ► Security grants the system access to the appropriate users only. ► External threats are involved. ► More convoluted queries are handled. ► Security illustrates that which person is granted for using the system. ► Encryption and certification mechanisms are used. PROTECTION ► While protection deals with the access to the system resources. ► Internal threats are involved. ► Simple queries are handled. ► Whereas protection determines that what files can be accessed or permeated by a special user. ► Authorization mechanism is implemented.
  • 13. CONCLUSION Security at the physical and human levels, although important is for the most part beyond the scope. The security of Operating System depends on us because the more precautions we will take the more secure our Operating System will be. Security within the operating system and also in between the operating system is implemented in several ways ranging from passwords of authentication through guarding against viruses to detecting intrusions.