Difference between Protection and Security in Operating System
Some operating system mechanisms facilitate us to stop tampering with logical and physical resources. Some of these methods are security and protection. Protection and security are distinct concepts, despite the fact that they are commonly used interchangeably.
Protection is a tactic that aids in preventing unauthorized people from accessing the system or data. On the other hand, security is a method that helps us to shield the user's facts in opposition to disruption from the outside party like unauthorized customers of the different systems.
Let's now get into more detail concerning protection and security.
What is Protection in Operating System?
Protection is a part of security that controls system access by limiting the kinds of file access those users are allowed. Protection addresses the system's internal dangers. It offers a way to regulate who has access to what processes, software, and user resources. To keep the system operating properly, it simply specifies which files a certain user can access, read, and alter.
The security of a system must guarantee that users or processes have valid permission. As a result, the CPU, memory regions, and other resources are accessible to approved users or programs.
We can use protection to perform some techniques that aid in identifying and enforcing the control that will be enforced. Protection is a very helpful aspect of the operating system's multi-programming. It forbids the sharing of memory and directories inside a logical and physical namespace by unreliable users.
What is Security in Operating System?
The operating system's external dangers are dealt with using security. The security of a system depends on its surrounding environment and requires an appropriate defence mechanism. Resources in this sense could be data that is kept on the system, in the CPU, memory, discs, etc.
Computer resources are protected by security mechanisms from unauthorized access, manipulation, and inconsistency. Security gives us a tool to evaluate users before granting them access to the system. The authentication mechanism used by the system to protect its physical resources and the accuracy of its stored data is emphasized by the system's security.
Security is a technique that guards against intervention from a person or entity outside the system and safeguards the user's programs and data.
Threats that frequently arise in a System
Following is a list of some common threats in a system:
- Virus: A malware attack on the system is known as a virus. A virus is a type of malware that spreads between computers and corrupts data and software.Viruses typically consist of a little piece of code that is embedded in the system and destroys files. It can crash them which makes it more harmful.
- Trojan horse: A Trojan horse is a type of malware that can be downloaded into a computer by a reliable program or application.Unauthorized access to a system's login information is possible with a Trojan horse. They might used by a hostile user to access the system.
- Worm: A computer worm is a type of malware whose primary goal is to infect a computer system, then replicate itself and spread to other computers. A worm can fully kill a system by utilizing all of its resources to the maximum extent possible.
- Trap door: In terms of software, a trap door is a back door that anyone can use to access any system without having to follow the standard security access protocols. It might be present in a system without the user being aware of it.
- Denial of Service: In order to prevent the intended users from using a computer system or network, a Denial-of-Service (DoS) attack must first bring it to a complete stop.
Difference between Protection and Security
Protection | Security |
Protection is concerned with who has access to the system's resources. | Security assures that only authorized users are allowed to access to the system. |
Threats within the system are dealt with by protection. | Security deals with external dangers to the system. |
Simple inquiries are answered by protection. | More complicated queries are answered by security. |
It specifies the files that a particular user may access, view, and alter. | It specifies who is allowed access to the system. |
Protection is provided through a method for permission. | Mechanisms for certification (authentication) and encryption are used. |
Controlling access to processes, programs, and user resources are made possible through protection. | Security offers a mean to protect user and system resources from all outside users. |