0 valutazioniIl 0% ha trovato utile questo documento (0 voti)
91 visualizzazioni13 pagine
OS should provide protection mechanisms and implement a system administrator (s) defined security Flexibility to of change when needed to fulfill the need requirements of all the processes. Authentication Mechanism External Authentication Mechanism for the user and a mechanism meant to prevent an application run unless the user registers and the system administrator (software) authorizes.
OS should provide protection mechanisms and implement a system administrator (s) defined security Flexibility to of change when needed to fulfill the need requirements of all the processes. Authentication Mechanism External Authentication Mechanism for the user and a mechanism meant to prevent an application run unless the user registers and the system administrator (software) authorizes.
Copyright:
Attribution Non-Commercial (BY-NC)
Formati disponibili
Scarica in formato PDF, TXT o leggi online su Scribd
OS should provide protection mechanisms and implement a system administrator (s) defined security Flexibility to of change when needed to fulfill the need requirements of all the processes. Authentication Mechanism External Authentication Mechanism for the user and a mechanism meant to prevent an application run unless the user registers and the system administrator (software) authorizes.
Copyright:
Attribution Non-Commercial (BY-NC)
Formati disponibili
Scarica in formato PDF, TXT o leggi online su Scribd
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 1 Inc. 1. Important Security Functions
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 2 Inc. Protection Mechanism
OS should provide protection mechanisms
and implement a system administrator (s) defined security
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 3 Inc. Flexibility to of change
when needed to fulfill the need
requirements of all the processes. For example, a process has control of 32 memory blocks at an instance and the OS configured the system accordingly. t Later when more processes are created, this can be reconfigured.
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 4 Inc. Controlled resource sharing
Controlling read and write of the resources
and parameters by user processes. For example, some resources write only for a process and some read only for a set of processes Another example, memory buffer to which one process writes at an instant till that buffer is emptied by other process
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 5 Inc. Confinement Mechanism
Mechanism that restricts sharing of
parameters to a set of processes only .
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 6 Inc. Security Policy (Strategy)
Rules for authorizing access to the OS,
system and information. A policy example is that a communication system may having a policy of peer-to- peer communication (connection establishment preceding the data packets flow).
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 7 Inc. Authentication Mechanism External authentication mechanism for the user and a mechanism meant to prevent an application run unless the user registers and the system administrator (software) authorizes Internal authentication for the process, and the process should not appear (impersonate) as some like other processes. User authentication can become difficult if the user disseminates password passwords or other authentication methods
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 8 Inc. Authorization
User or process (s) allowed to use the
system resources as per the security policy
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 9 Inc. Encryption
A tool to change information to make it
unusable by any other user or process unless without the appropriate key is used for deciphering it.
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 10 Inc. Summary
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 11 Inc. We learnt OS security issues are important considerations. Protection of memory and resources from any unauthorized and without explicit authorization write into the PCB or resource, or mix up of accesses of one by another, becomes imperative from an OS security and protection mechanism
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 12 Inc. End of Lesson 24 of Chapter 8
Chapter-8 L24: "Embedded Systems - Architecture,
2008 Programming and Design" , Raj Kamal, Publs.: McGraw-Hill, 13 Inc.