Page 207 - DCAP403_Operating System
P. 207
Operating System Mandeep Kaur, Lovely Professional University
Notes Unit 11: System Security
CONTENTS
Objectives
Introduction
11.1 System Security
11.2 Security Problem
11.3 Program Threats
11.4 System and Network Threats
11.5 Cryptography as a Security Tools
11.5.1 Hashing
11.5.2 Pretty Good Privacy (PGP)
11.6 User Authentication
11.7 Implementing Security Defenses
11.8 Types of Intrusion Prevention System
11.9 Implementation Challenges
11.10 Firewall to Protect Systems and Networks
11.11 Summary
11.12 Keywords
11.13 Self Assessment
11.14 Review Questions
11.15 Further Readings
Objectives
After studying this unit, you will be able to:
Define system security
Explain system and network threats
Know cryptography as a security tools
Describe user authentication
Explain various types of intrusion prevention system
Introduction
Computer security is traditionally defined by the three attributes of confi dentiality, integrity,
and availability. Confidentiality is the prevention of unauthorised disclosure of information.
Integrity is the prevention of unauthorised modification of information, and availability is the
prevention of unauthorised withholding of information or resources. Protection refers to a
mechanism for controlling the access of programs, processes, or users to the resources defi ned
by a computer controls to be imposed, together with some means of enforcement. Protection can
improve reliability by detecting latent errors at the interfaces between component subsystems.
200 LOVELY PROFESSIONAL UNIVERSITY