goals of protection
DESCRIPTION
written and designed by veena mangiTRANSCRIPT
![Page 1: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/1.jpg)
![Page 2: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/2.jpg)
![Page 3: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/3.jpg)
What is protection ?
Hardware protection?
Goals of protection?
![Page 4: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/4.jpg)
Protection is the subset of computer
security that deals with controlling ,
accessing and protecting the computer
resources which is provided by operating
system
![Page 5: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/5.jpg)
Dual mode protection
C PU protection
Memory protection
Input/output protection
![Page 6: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/6.jpg)
Dual mode protection•Sharing system resources requires operating
system to ensure that an incorrect program
cannot cause other programs to execute
incorrectly.
Provide hardware support to differentiate
betweenat least two modes of operations.
![Page 7: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/7.jpg)
1. User mode execution done on behalf of a
user.
2.Monitor mode execution done on behalf of operating
system.
![Page 8: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/8.jpg)
Interrupt/fault
Set user mode
usermonitor
![Page 9: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/9.jpg)
Mode bit added to computer
hardware to indicate the current
mode: monitor (0) or user (1).
When an interrupt or fault occurs
hardware switches to monitor mode
monitor
Privileged instructions can be
issued only in monitor mode.
![Page 10: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/10.jpg)
.Timer - interrupts computer after
specified period
to ensure operating system maintains
control.
Timer commonly used to implement
time sharing.
g Timer also used to compute the
current time.
![Page 11: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/11.jpg)
Memory protection
main purpose of memory
protection is to prevent a
process that has not been
allocated to it
![Page 12: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/12.jpg)
I/O ProtectionAll I/O instructions are
privileged instructions.
Must ensure that a user program could
never gain control of the computer in
monitor mode (i.e., a user program that, as
part of its execution, stores
a new address in the interrupt vector).
![Page 13: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/13.jpg)
To prevent malicious misuse of the system by users
or programs
To ensure that each shared resource is used only in
accordance with system policies, which may be set
either by system designers or by system administrators.
To ensure that errant programs cause the minimal
amount of damage possible.
![Page 14: Goals of protection](https://reader033.vdocument.in/reader033/viewer/2022060200/5598c9a01a28ab36568b470a/html5/thumbnails/14.jpg)