1 / 11

WEL-COME

Learn about the principles of protection in computer systems, including goals, domains, and the benefits of implementing proper protection measures. This text explains how to limit damage from bugs or abuse and ensure that each object is accessed correctly and only by authorized processes.

mbush
Download Presentation

WEL-COME

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WEL-COME R.Nageshwar T.Y COMPUTER 411149

  2. Topics 1) Principles of Protection. 2) Goals of Protection. 3) Domain of Protection. Refer: Gavin text book Page no: 591 to 595

  3. Principles of Protection • Programs, users and systems should be given just enough privileges (advantage) to perform their tasks. • Limits damage if entity has a bug, gets abused. • Can be static (during life of system, during life of process) Or dynamic (changed by process as needed)

  4. Examples of benefits: • Breaking into onesystemshould not be equivalent to breaking into all. • Breaking into one user account should not mean getting access to all.

  5. Goals of Protection • Operating system consists of a collection of objects, hardware or software. • Each object has a unique name and can be accessed through a well-defined set of operations. • Protection problem - ensure that each object is accessed correctly and only by those processes that are allowed to do so.

  6. Continue……. • Provide a mechanism for the enforcement of the policiesgoverning resources use. • Policy: what is to be done. • Mechanism: how something is to be done.

  7. Domain of Protection • Domain = set of access-rights. • Access-right = <object-name, rights-set> • where rights-set is a subset of all valid operations that can be performed on • the object.

  8. Figure1. System with three protection domain • Domain may be: user, process, procedure.

  9. Association between processes and domains: static or dynamic. • Static: may need to change the domain content to accommodate the “need to-know” principle. • Dynamic: mechanism needed for domain switching.

  10. Any Questions???

  11. ☺Thank you☺

More Related