An operating system provides access to a range of resources available in the security software that depends really on a range of technologies. A modern on the system and external devices, such as, for example, take the core network.The operating system must be able to differentiate between the requirements to be accepted for processing, and others who should not delineate activity. While some systems can not distinguish between "privileged" and "privileged" applicants often have a form of identity, such as a username. To determine the identity can be an authentication. Often a user will be indicated, and each user can have a password. Other authentication methods such as magnetic cards or biometric data could be used. In some cases, in particular, connections from the network resources without authentication (such as reading files on a network drive) can be accessed. By the notion of identity is covered, an application for approval of specific services and resources accessible by the applicant, are even connected to a system to connected to one or another user account of the applicant or different user groups configuration in which the applicant belongs .In addition to the model to allow / deny security, offer a system with a high level of security, auditing options. This would allow tracking of requests for access to resources (eg, "You have to read this file?"). Internal security or the security of a current program is only possible if all possibly harmful requests must be made by breaks in the operating system kernel. If programs can directly access the hardware resources and can not be guaranteed.External security concerns a request from outside of the computer as a connection to a connected console or some kind of network connection. External requirements are often limited by the device driver for the kernel of the operating system, which can be passed to applications in transit, and stops. The security of operating systems has long been a concern for highly sensitive data on computers, both commercial and military have been held. The Government of the United States Department of Defense (DoD) created the system reliable evaluation criteria (TCSEC), the one standard that has established the basic requirements for assessing the effectiveness of security measures. This was to be of crucial importance for the policies of the operating system, because the TCSEC was used to assess, classify and select computer systems for the treatment, storage, retrieval and viewing of sensitive information or classified.Network services include offerings such as file sharing, printing, e-mail, Web sites and file transfer (FTP), most of which affect the security. In the first line of security hardware devices such as firewalls and intrusion detection / prevention systems are known. The amount of the operating system, a number of software firewalls available, and intrusion detection / prevention systems. The modern operating systems come with a software firewall that is enabled by default. A firewall can be configured to allow or deny network traffic or a service or application is to be on the operating system. Therefore, you can install and run, secure, such as, for example, Telnet or FTP, and must not be threatened by a security breach because the firewall try all traffic, can deny service to connect to this port.An alternative strategy, and strategy sandbox is only on systems that do not meet the requirements of virtualization Popek and Goldberg, the operating system, the user programs into native code, but it emulates a processor or a large amount of p-code based system such Java.Internal security is especially relevant for multi-user systems and enables any user of the system, your private files that other users can not modify or read. Internal security is also important if the monitoring are of no use, because a program can bypass the operating system, including bypassing the audit.
সোমবার, ২৫ জুলাই, ২০১১
এতে সদস্যতা:
পোস্টগুলি (Atom)