goals of protection

14

Upload: veena-ali

Post on 05-Jul-2015

55 views

Category:

Education


0 download

DESCRIPTION

written and designed by veena mangi

TRANSCRIPT

Page 1: Goals of protection
Page 2: Goals of protection
Page 3: Goals of protection

What is protection ?

Hardware protection?

Goals of protection?

Page 4: Goals of protection

Protection is the subset of computer

security that deals with controlling ,

accessing and protecting the computer

resources which is provided by operating

system

Page 5: Goals of protection

Dual mode protection

C PU protection

Memory protection

Input/output protection

Page 6: Goals of protection

Dual mode protection•Sharing system resources requires operating

system to ensure that an incorrect program

cannot cause other programs to execute

incorrectly.

Provide hardware support to differentiate

betweenat least two modes of operations.

Page 7: Goals of protection

1. User mode execution done on behalf of a

user.

2.Monitor mode execution done on behalf of operating

system.

Page 8: Goals of protection

Interrupt/fault

Set user mode

usermonitor

Page 9: Goals of protection

Mode bit added to computer

hardware to indicate the current

mode: monitor (0) or user (1).

When an interrupt or fault occurs

hardware switches to monitor mode

monitor

Privileged instructions can be

issued only in monitor mode.

Page 10: Goals of protection

.Timer - interrupts computer after

specified period

to ensure operating system maintains

control.

Timer commonly used to implement

time sharing.

g Timer also used to compute the

current time.

Page 11: Goals of protection

Memory protection

main purpose of memory

protection is to prevent a

process that has not been

allocated to it

Page 12: Goals of protection

I/O ProtectionAll I/O instructions are

privileged instructions.

Must ensure that a user program could

never gain control of the computer in

monitor mode (i.e., a user program that, as

part of its execution, stores

a new address in the interrupt vector).

Page 13: Goals of protection

To prevent malicious misuse of the system by users

or programs

To ensure that each shared resource is used only in

accordance with system policies, which may be set

either by system designers or by system administrators.

To ensure that errant programs cause the minimal

amount of damage possible.

Page 14: Goals of protection