Protection and Security Flashcards
It is the mechanism for controlling access of processes of users to the resources defined by the computer sytem
Protection
It can improve reliability by detecting latent errors at the interfaces between components subsystems.
protection
Its job is to defend a system from internal or external attacks
Security
associated with all files, processes of that user to determine access control
User Identifiers (ID)
allows set of users to be defined and controls managed, then also associated
with each process
Group Identifiers (ID)
Allows user to change to effective ID with more rights
Privelege Escalation
allows direct command entry Sometimes implemented in kernel, sometimes by systems program
CLI or Command Interpreter
stands for CLI
command interface line
User-friendly desktop metaphor interface
•Usually mouse, keyboard, and monitor
• Icons represent files, programs, actions,etc
GUI - Graphical User Interface
Programming Interface to the services provided by the OS and is typically written in high level language
System Call
3 most common API’s (Application Programming Interface
- Win32 API (windows)
- POSIX API (posix-based system including the virtually all versions of UNIX, Linus, Mac OS X
- Java API (JVM -Java Virtual Machine)
6 types of System Calls
- Process Control
- File Management
- Device management
- Information Maintenance
- Communications
- Protection
A running program needs to be able to halt its execution either normally(end) or abnormally(abort)
Process Control
It examined the dump of memory written in a disk caused by error trap
debugger
We first need to be able to create and delete files. Either system call requires the name of the file and
perhaps some of the file’s attributes
File Management