Page 190 - DCAP403_Operating System
P. 190

Unit 10: System Protection




          This used to be enforced mainly through a physical security guard. Then, with the advent of   Notes
          electronic devices, access control has evolved into the use of physical card access systems of a
          wide variety including biometric activated devices.
          As computers evolved the meaning of access control began to change. Initially “access control
          lists” evolved specifying the user identities and the privileges granted to them in order to access
          a network operating system or an application.

          Access control further evolved into the authentication, authorization and audit of a user for
          a session. Access control authentication devices evolved to include id and password, digital

          certificates, security tokens, smart cards and biometrics.
          Access control authorization meanwhile evolved into Role Based Access Control (RBAC). This
          normally involves “mandatory access control”. Mandatory access control is access control policies
          that are determined by the system and not the application or information owner.
          RBAC is commonly found in government, military and other enterprises where the role


          definitions are well defined, the pace of change is not that fast and the supporting human resource
          environment is capable of keeping up with changes to an identity re their roles and privileges.
          Access control is the process by which users are identified and granted certain privileges to

          information, systems, or resources. Understanding the basics of access control is fundamental to
          understanding how to manage proper disclosure of information.

          10.1 System Protection

          The use of computers to store and modify information can simplify the composition, editing,

          distribution, and reading of messages and documents. These benefits are not free, however,
          part of the cost is the aggravation of some of the security problems discussed above and the
          introduction of some new problems as well. Most of the difficulties arise because a computer and

          its programs are shared amongst several users.

                Example: Consider a computer program that displays portions of a document on a
          terminal. The user of such a program is very likely not its developer. It is, in general, possible for
          the developer to have written the program so that it makes a copy of the displayed information
          accessible to himself (or a third party) without the permission or knowledge of the user who
          requested the execution of the program. If the developer is not authorised to view this information,
          security has been violated.
          In compensation for the added complexities automation brings to security, an automated system,
          if properly constructed, can bestow a number of benefits as well.


                Example: A computer system can place stricter limits on user discretion. In the paper
          system, the possessor of a document has complete discretion over its further distribution. An
          automated system that enforces distribution constraints strictly can prevent the recipient of a
          message or document from passing it to others. Of course, the recipient can always copy the
          information by hand or repeat it verbally, but the inability to pass it on directly is a signifi cant
          barrier.

          An automated system can also offer new kinds of access control. Permission to execute certain
          programs can be granted or denied so that specific operations can be restricted to designated

          users. Controls can be designed so that some users can execute a program but cannot read or
          modify it directly. Programs protected in this way might be allowed to access information not
          directly available to the user, filter it, and pass the results back to the user.







                                           LOVELY PROFESSIONAL UNIVERSITY                                   183
   185   186   187   188   189   190   191   192   193   194   195