Operating System Tutorial

Operating System Tutorial Types of Operating System Evolution of Operating System Functions of Operating System Operating System Properties Operating System Services Components of Operating System Needs of the Operating System

Operating Systems

Linux Operating System Unix Operating System Ubuntu Operating System Chrome Operating Systems Fedora Operating System MAC Operating System MS Windows Operating System Solaris Operating System Cooperative Operating System CorelDRAW Operating System CentOS FreeBSD Operating Systems Batch Operating System MS-DOS Operating System Commercial Mobile Operating Systems

Differences

Difference Between Multi-programming and Multitasking Difference between C-LOOK and C-SCAN Difference between Rotational Latency and Disk Assess Time Trap vs Interrupt Difference between C-SCAN and SSTF Difference between SCAN and FCFS Difference between Seek Time and Disk Access Time Difference between SSTF and LOOK Difference between Process and Program in the Operating System Difference between Protection and Security in Operating System

How To

How to implement Monitors using Semaphores How to Install a Different Operating System on a PC

Questions

What is Kernel and Types of Kernel What is DOS Operating System What is Thread and Types of Thread What is Process Scheduler and Process Queue What is Context Switching What is CPU Scheduling What is Producer-Consumer Problem What is Semaphore in Operating System Monitors in Operating System What is Deadlock What is Paging and Segmentation What is Demand Paging What is Virtual Memory What is a Long term Scheduler What is Page Replacement in Operating System What is BSR Mode What is Convoy Effect What is Job Sequencing in Operating System Why is it critical for the Scheduler to distinguish between I/O-bound and CPU-bound programs Why is there a Need for an Operating System

Misc

Process Management Process State Scheduling Algorithm FCFS (First-come-First-Serve) Scheduling SJF (Shortest Job First) Scheduling Round-Robin CPU Scheduling Priority Based Scheduling HRRN (Highest Response Ratio Next) Scheduling Process Synchronization Lock Variable Mechanism TSL Mechanism Turn Variable Mechanism Interested Variable Mechanism Deadlock Avoidance Strategies for Handling Deadlock Deadlock Prevention Deadlock Detection and Recovery Resource Allocation Graph Banker’s Algorithm in Operating System Fixed Partitioning and Dynamic Partitioning Partitioning Algorithms Disk Scheduling Algorithms FCFS and SSTF Disk Scheduling Algorithm SCAN and C-SCAN Disk Scheduling Algorithm Look and C-Look Disk Scheduling Algorithm File in Operating System File Access Methods in Operating System File Allocation Method Directory Structure in Operating System N-Step-SCAN Disk Scheduling Feedback Queue in Operating System Contiguous Memory Allocation in Operating System Real-time Operating System Starvation in Operating System Thrashing in Operating System 5 Goals of Operating System Advantages of Operating System Advantages of UNIX Operating System Bit Vector in Operating System Booting Process in Operating System Can a Computer Run Without the Operating System Dining Philosophers Problem in Operating System Free Space Management in Operating System Inter Process Communication in Operating System Swapping in Operating System Memory Management in Operating System Multiprogramming Operating System Multitasking Operating Systems Multi-user Operating Systems Non-Contiguous Memory Allocation in Operating System Page Table in Operating System Process Scheduling in Operating System Segmentation in Operating System Simple Structure in Operating System Single-User Operating System Two Phase Locking Protocol Advantages and Disadvantages of Operating System Arithmetic operations in binary number system Assemblers in the operating system Bakery Algorithm in Operating System Benefits of Ubuntu Operating System CPU Scheduling Criteria in Operating System Critical Section in Operating System Device Management in Operating System Linux Scheduler in Operating System Long Term Scheduler in Operating System Mutex in Operating System Operating System Failure Peterson's Solution in Operating System Privileged and Non-Privileged Instructions in Operating System Swapping in Operating System Types of Operating System Zombie and Orphan Process in Operating System 62-bit operating system Advantages and Disadvantages of Batch Operating System Boot Block and Bad Block in Operating System Contiguous and Non - Contiguous Memory Allocation in Operating System Control and Distribution Systems in Operations Management Control Program in Operating System Convergent Technologies in Operating System Convoy Effect in Operating System Copy Operating Systems to SSD Core Components of Operating System Core of UNIX Operating System Correct Value to return to the Operating System Corrupted Operating System Cos is Smart Card Operating System Cosmos Operating Systems Examples Generation of Operating System Hardware Solution in Operating System Process Control Block in Operating System Function of Kernel in Operating System Operating System Layers History of Debian Operating Systems Branches and Architecture of Debian Operating Systems Features and Packages of Debian Operating Systems Installation of Operating System on a New PC Organizational Structure and Development in Debian Operating Systems User Interface in Operating System Types Of Memory in OS Operating System in Nokia Multilevel Paging in OS Memory Mapping Techniques in OS Memory Layout of a Process in Operating System Hardware Protection in Operating System Functions of File Management in Operating System Core of Linux Operating System Cache Replacement Policy in Operating System Cache Line and Cache Size in Operating System What is Memory Mapping? Difference Between Network Operating System And Distributed Operating System What is the difference between a Hard link and a Soft Link? Principles of Preemptive Scheduling Process Scheduling Algorithms What is NOS? What is the Interrupt I/O Process? What is Time Sharing OS What is process termination? What is Time-Sharing Operating System What is Batch File File system manipulation

Difference between Protection and Security in Operating System

Some operating system mechanisms facilitate us to stop tampering with logical and physical resources. Some of these methods are security and protection. Protection and security are distinct concepts, despite the fact that they are commonly used interchangeably.

Protection is a tactic that aids in preventing unauthorized people from accessing the system or data. On the other hand, security is a method that helps us to shield the user's facts in opposition to disruption from the outside party like unauthorized customers of the different systems.

Let's now get into more detail concerning protection and security.

What is Protection in Operating System?

Protection is a part of security that controls system access by limiting the kinds of file access those users are allowed. Protection addresses the system's internal dangers. It offers a way to regulate who has access to what processes, software, and user resources. To keep the system operating properly, it simply specifies which files a certain user can access, read, and alter.

The security of a system must guarantee that users or processes have valid permission. As a result, the CPU, memory regions, and other resources are accessible to approved users or programs.

We can use protection to perform some techniques that aid in identifying and enforcing the control that will be enforced. Protection is a very helpful aspect of the operating system's multi-programming. It forbids the sharing of memory and directories inside a logical and physical namespace by unreliable users.

What is Security in Operating System?

The operating system's external dangers are dealt with using security. The security of a system depends on its surrounding environment and requires an appropriate defence mechanism. Resources in this sense could be data that is kept on the system, in the CPU, memory, discs, etc.

Computer resources are protected by security mechanisms from unauthorized access, manipulation, and inconsistency. Security gives us a tool to evaluate users before granting them access to the system. The authentication mechanism used by the system to protect its physical resources and the accuracy of its stored data is emphasized by the system's security.

Security is a technique that guards against intervention from a person or entity outside the system and safeguards the user's programs and data.

Threats that frequently arise in a System

Following is a list of some common threats in a system:

  • Virus: A malware attack on the system is known as a virus. A virus is a type of malware that spreads between computers and corrupts data and software.Viruses typically consist of a little piece of code that is embedded in the system and destroys files. It can crash them which makes it more harmful.
  • Trojan horse: A Trojan horse is a type of malware that can be downloaded into a computer by a reliable program or application.Unauthorized access to a system's login information is possible with a Trojan horse. They might used by a hostile user to access the system.
  • Worm: A computer worm is a type of malware whose primary goal is to infect a computer system, then replicate itself and spread to other computers. A worm can fully kill a system by utilizing all of its resources to the maximum extent possible.
  • Trap door: In terms of software, a trap door is a back door that anyone can use to access any system without having to follow the standard security access protocols. It might be present in a system without the user being aware of it.
  • Denial of Service: In order to prevent the intended users from using a computer system or network, a Denial-of-Service (DoS) attack must first bring it to a complete stop.

Difference between Protection and Security

ProtectionSecurity
Protection is concerned with who has access to the system's resources.Security assures that only authorized users are allowed to access to the system.
Threats within the system are dealt with by protection.Security deals with external dangers to the system.
Simple inquiries are answered by protection.More complicated queries are answered by security.
It specifies the files that a particular user may access, view, and alter.  It specifies who is allowed access to the system.
Protection is provided through a method for permission.  Mechanisms for certification (authentication) and encryption are used.  
Controlling access to processes, programs, and user resources are made possible through protection.  Security offers a mean to protect user and system resources from all outside users.