Posts

Showing posts with the label Security

From MULTICS and MLS to modern UNIX

From MULTICS and MLS to modern UNIX Read Aloud Stop Reading From MULTICS and MLS to modern UNIX MULTICS (Multiplexed Information and Computing Service) was a time-sharing operating system developed in the 1960s. It was designed to be highly secure and support multiple users with different security clearances, known as Multilevel Security (MLS). The concept of MLS was based on the idea that data should only be accessible to users with the proper clearance, and that users with higher clearance should be able to access data at lower levels. In the early 1970s, Ken Thompson and Dennis Ritchie at Bell Labs created the UNIX operating system, which borrowed many ideas from MULTICS. However, UNIX was designed to be simpler and more portable than MULTICS. In particular, UNIX did not support MLS, but instead relied on file permissions to control access to files and directories. Over time, security features were added to UNIX to address the shortcomings of file permis

Auditing

Auditing Read Aloud Stop Reading Auditing Auditing is a crucial aspect of security in operating systems. It involves the recording and analysis of system activity for the purpose of detecting and investigating potential security breaches. Auditing can also be used to monitor compliance with security policies and regulations. Security auditing is an important aspect of system security that involves monitoring and analyzing system activity to identify and prevent potential security threats. The goal of auditing is to ensure the integrity and confidentiality of system data, as well as the availability of system resources. Auditing can also help identify and address vulnerabilities in the system and ensure compliance with regulatory requirements. Types of Auditing There are two main types of auditing: event-based auditing and periodic auditing. Event-Based Auditing Event-based auditing involves monitoring system events in real-time and generating an audit log

Mediation

Mediation Read Aloud Stop Reading Mediation Security mediation refers to the process of controlling access to system resources by enforcing rules and policies. This is typically achieved by implementing security mechanisms that can monitor and control access to resources such as files, network connections, and system settings. The goal of security mediation is to prevent unauthorized access to system resources and ensure that access is granted only to authorized users or processes. This is achieved by implementing various security measures such as authentication, authorization, and auditing. Authentication is the process of verifying the identity of a user or a process. This is typically achieved by requiring users to provide a username and password or by using biometric identification methods such as fingerprint or iris scanning. Once the user is authenticated, the system can then determine whether the user is authorized to access the requested resource. Au

Isolation

Security: isolation Read Aloud Stop Reading Security: isolation Isolation is a key aspect of security in operating systems. It involves preventing unauthorized access or interference between different processes, users, or applications running on a system. Why is isolation important? Without isolation, an attacker who gains access to one process or application could potentially access or compromise sensitive data or resources belonging to other processes or applications on the system. Additionally, poorly isolated applications or processes can interfere with each other, causing system instability or crashes. How is isolation achieved? There are several techniques used to achieve isolation: Process isolation: Each process is run in its own address space, preventing one process from accessing the memory or resources of another process. User isolation: Users are given separate accounts and permissions, preventing one user from accessing the data or re

Security: integrity

Security: integrity Read Aloud Stop Reading Security: integrity Security is an important concern in operating systems, and one of the key aspects of security is integrity. Integrity refers to the ability of the system to ensure that data has not been tampered with or modified in an unauthorized manner. In this context, integrity can be divided into two main categories: data integrity and system integrity. Data Integrity Data integrity is concerned with the accuracy and consistency of data. In an operating system, there are several factors that can affect data integrity. One of the key challenges is ensuring that data is not corrupted or modified in an unauthorized manner. This can be achieved through the use of access controls and permissions, which can prevent unauthorized access to sensitive data. Another challenge is ensuring that data is consistent across different parts of the system. This can be achieved through the use of transactions and atomic operatio