![]() Scheduling: The operating system is responsible for scheduling processes and may give certain users a higher priority for the programs they run than others. In most cases, these resources are files but they can be devices or communication interfaces 1. User privileges: Each process run by the system or by a user runs with specific privileges that define access rights – what resources the process can and cannot access. A protection mechanism enables different users to have varying levels of access to resources, an ability to run specific programs, and in some cases, run certain programs with privileges other than those of the user.Īt the operating system level, protection encompasses several components: User accounts: Users need to identify themselves and be authenticated so the system can have assurance of the integrity of the user and apply appropriate policies to the user’s requested actions. A protection mechanism enforces security policies. A policy is the definition of what is or is not permissible in the organization. Authorization determines whether an authenticated user is permitted access to a resource and is based on the security policy. After that, ,the system can authorize the user’s access to a desired resource. Authentication is the process of getting and validating a user’s identity. To enforce security policies and protect resources, we need to know who they apply to. Processor time and system memory are also finite resources that need to be allocated across all process in a fair manner that conforms to established policies.Īccess control refers to the policies and mechanisms that control who is permitted access to resources and what they can do to those resources. Users should not be able to read or modify data if a policy prohibits them from doing so. ![]() The operating system must enforce these access privileges. Different users will have different access privileges to files, devices, and other system resources. Protection is the mechanism that enforces security policies.Īn operating system is responsible for giving programs access to the resources they need when they run. ![]() ![]() Computer Security: Paul Krzyzanowski Access Control Thinking about SecurityĪ crucial element of operating systems is protection, controlling who is permitted to access various system resources and what they are allowed to do. ![]()
0 Comments
Leave a Reply. |