English

Access and Security Aspects of O.S.

Advertisements

Access and Security Aspects of O.S.

Security 

The term security is defined as:  

Secure systems will control, through use of specific security features, access to information that only authorized individuals or processes operating on their behalf will have access to read, write, create or delete.” 

The elements of security are : 

  1. Confidentiality: Ensuring that the information is accessed by authorized individuals. (by controlling Read operations.)
  2. Integrity : Ensuring that the information is not tampered in an unauthorized manner (By controlling write operations)
  3. Availability: Ensuring that the information is available to authorized users at the right time. (by controlling read and delete operations and ensuring fault recovery)

Security threats 

Sharing and protection are requirements of any modern computing. More sharing gives rise to more possibility of security threats. The major threats to security can be categorized as : 

  1. Tapping: Unauthorized use of service. 
  2. Disclosure: Unauthorized disclosure of information. 

3. Amendment: Unauthorized alteration or deletion of information.

4. Fabrication: Unauthorized fabrication of information.

5. Denial: Denial of service to authorized users 

Attacks on Security 

The security system can be attacked in number of ways: 

1) Browsing: In some systems, there exist files with access controls which are very permissive. One can browse through the system files to get this information, after which unprotected files/data bases could be easily accessed. 

2) Trap doors: Sometimes software engineers leave some secret entry point to modify their programs. These are called trap doors. They can be misused by others. 

3) Rouge software: Certain programs like worms, viruses attack the system. 

4) Waste recovery: By using some technique, deleted files can be recovered . Passwords may be recollected. This is waste recovery. 

Computer worms 

A computer worm is a complete program by itself. It is written in such a way that it spreads to other computers over a network, but while doing this, it consumes the network resources to a very large extent. It can bring the network to a halt. Usually, worm does not harm any other program. It just spreads, thereby consuming large resources such as transmission capacity, disk storage and denying services to others.  

Computer virus 

A computer virus is a program segment. It gets onto many useful programs. Virus is not a complete program. It cannot operate independently and causes direct harm to the system by corrupting code and data. There are several types of viruses:   

  1. Boot sector infectors: Virus can get into system memory if the machine is booted with an infected floppy or hard disk.
  2. Memory Resident Infector: It loads upon execution of an infected file and infects a non-infected file.
  3. File specific Infectors: Infection occurs when an infected file is executed. Additionally reboots the system while infecting
  4. General purpose Infector: General purpose infector can infect exe file .
  5. Command processor Infector: Infection occurs when an infected file is executed. The virus then loads its viral code into memory. Once memory resident, 205 can infect .com files as they are accessed.

Infection methods 

Following are well known methods by which a virus can infect other programs. 

  1. Append: The viral code appends itself to unaffected program. 
  2. Replace: The viral code replaces the original executable program completely or partially. 3. Insert: Viral code is inserted in body of an executable code to carry out some funny actions.
  3. Delete: Viral code deletes some code from executable code. 
  4. Redirect: Here the normal control flow of program is changed to execute some other code.

Virus detection, removal & prevention 

Note: Virus detection programs check for integrity of binary files. The program maintains a checksum on each file. A mismatch in it indicates virus. For some viruses the bit pattern in code can be predicted. The virus removal program scans disk for pattern of known viruses. On detection it removes them. Data recovery is impossible. Prevention is the best measure. The safest way is to buy official, legal copies of software from reliable sources. Free, unreliable softwares should not be used. 

If you would like to contribute notes or other learning material, please submit them using the button below.
Advertisements
Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×