Page 207 - DCAP403_Operating System
P. 207

Operating System                                              Mandeep Kaur, Lovely Professional University




                    Notes                                Unit 11: System Security



                                     CONTENTS

                                     Objectives
                                     Introduction
                                     11.1 System Security
                                     11.2 Security Problem
                                     11.3 Program Threats
                                     11.4  System and Network Threats

                                     11.5  Cryptography as a Security Tools
                                          11.5.1 Hashing
                                          11.5.2  Pretty Good Privacy (PGP)
                                     11.6 User Authentication
                                     11.7  Implementing Security Defenses
                                     11.8  Types of Intrusion Prevention System
                                     11.9 Implementation Challenges
                                     11.10  Firewall to Protect Systems and Networks
                                     11.11 Summary

                                     11.12 Keywords
                                     11.13 Self Assessment
                                     11.14 Review Questions
                                     11.15 Further Readings

                                   Objectives

                                   After studying this unit, you will be able to:

                                       Define system security
                                       Explain system and network threats
                                       Know cryptography as a security tools
                                       Describe user authentication
                                       Explain various types of intrusion prevention system

                                   Introduction

                                   Computer security is traditionally defined by the three attributes of confi dentiality, integrity,

                                   and availability. Confidentiality is the prevention of unauthorised disclosure of information.


                                   Integrity is the prevention of unauthorised modification of information, and availability is the
                                   prevention of unauthorised withholding of information or resources. Protection refers to a
                                   mechanism for controlling the access of programs, processes, or users to the resources defi ned
                                   by a computer controls to be imposed, together with some means of enforcement. Protection can
                                   improve reliability by detecting latent errors at the interfaces between component subsystems.



          200                              LOVELY PROFESSIONAL UNIVERSITY
   202   203   204   205   206   207   208   209   210   211   212