What is the Difference Between Protection and Security in Operating System

Difference Between Protection and Security in Operating System

What is the Difference Between Protection and Security in Operating System?

The main difference between protection and security of the operating systems is that the protection focuses on interior threats in a computer system while security focuses on external threats to a computer system.

Introduction

Interference in resource usage is a very serious threat in an OPERATING SYSTEM. The nature of the threat-totally is contingent on the nature of a resource and the method in which it is used. In this, we discuss threats to the information stored in files because they are the most common, and important also the most composite and difficult, threats.

Protection and Security in Operating System

OS uses two sets of methods to counter threats to information namely:

  1. Protection
  2. Security

Policies and Apparatuses of Protection and Security

Here are the policies and apparatuses of protection and security. They are as follow:

Security in Operating System

Policy

Policy in the operating system describes whether a man can become a user of the system. This operation is performed by the system supervisor.

Mechanism

1. Add or delete by users
2. Confirm whether a person is an authorized user.

Protection in Operating System

Policy

Protection in the Operating system describes whether a user can get a specific file. The owner of a file performs this function while creating it.

Mechanisms

  1. Set or change protection information for a file.
  2. Check whether a file can be gained by a user.

 

Protection in Operating System

It involves protecting a user’s data and programs against interference by other illegal users of the system.

Facades to the protection of information

There are two facets to the protection of information.

Secrecy

Indicates that only authorized users should be able to contact information.

Privacy

This suggests that information should be used only for the purpose for which it is planned and communal.

 

“OS focuses on ensuring the secrecy of information and verdures the issue of secrecy to the users and their processes.”

 

Security in Operating System

Security is usually defined by the three attributes namely.

Confidentiality: It is the inhibition of unauthorized adjustment of information or incomes.

Integrity: It is the prevention of illegal

Availability: It is the prevention of unauthorized cover-up of information or incomes.

Security Threats: There are some direct and indirect security threats in the operating system.

Direct Security Threats

This is any direct spell on your obvious systems, whether from outside hackers or from dissatisfied insiders.

Indirect

This is a general unintentional occurrence, most usually computer viruses, computer worms, or Trojan horses.

Reasons for taking Security measures

There are some reasons for taking security measures in OS. They are given below:

  1. To stop loss of data
  2. To safe exploitation of data
  3. To stop cooperation of data
  4. To prevent theft of data
  5. To prevent damage

 

Security Models in Operating System

Security models can be discretionary or mandatory.

Discretionary: Holders of right can be allowed to transfer them at their choice.

Mandatory: Only selected roles are allowed to grant rights and users cannot transmission them.

Security policy Vs. Security Model

Here is the difference between the security policy and the security model.

Security Policy

Outlines some high-level points: how the data is retrieved, the amount of security obligatory, and what are the stages when these requirements are not met.

Security Model

The mechanism to support the security policy. This includes the design of the security system.

Authentication in Operating System

Sensible pledge that anyone who efforts to access a system or a network is an authentic user.
Mechanism.

  1. Password
  2. Physical Token or Artifacts
  3. Biometric Measure

Was this helpful?

1 / 0

Leave a Reply 0

Your email address will not be published. Required fields are marked *