SECURITY IN COMPUTING FIETH EDITION Chapter 4: Operating Systems 授课教师:高海波 可南中医药大学 信息管理与信息系统教研室 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
SECURITY IN COMPUTING, FIFTH EDITION Chapter 4: Operating Systems From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 1 授课教师:高海波 河南中医药大学 信息管理与信息系统教研室
2 Chapter 5 Objectives Basic security functions provided by operating systems System resources that require operating system protection Operating system design principles How operating systems control access to resources The history of trusted computing Characteristics of operating system rootkits From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Chapter 5 Objectives • Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits 2 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
3 Operating System Functions 黑黑 User Interface Operating Ices Management Communication Ing Resource Allocation CPU Memo Program 1/0 Devic From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Operating System Functions 3 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
History of Operating Systems Single-user systems, no OS Multiprogrammed os, aka monitors Multiple users Multiple programs Scheduling, sharing, concurrent use Personal computers From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
History of Operating Systems •Single-user systems, no OS • Multiprogrammed OS, aka monitors • Multiple users • Multiple programs • Scheduling, sharing, concurrent use •Personal computers 4 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
5 Protected Objects Memory Sharable l/o devices, such as disks Serially reusable I/O devices, such as printers Sharable programs and subprocedures Networks Sharable data From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
Protected Objects • Memory • Sharable I/O devices, such as disks • Serially reusable I/O devices, such as printers • Sharable programs and subprocedures • Networks • Sharable data 5 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved