0% found this document useful (0 votes)
753 views1 page

Protection in OS Goals and Principles

Protection

Uploaded by

rambalaaruna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
753 views1 page

Protection in OS Goals and Principles

Protection

Uploaded by

rambalaaruna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Goals and Principles of Protection in Operating Systems

Goals of Protection

In an Operating System (OS), protection means making sure that one program (or user) doesn't mess with

the memory, files, or resources of another program or user. It helps keep the system safe and running

smoothly.

Goals of Protection:

1. Safety: Ensure that only authorized programs or users can access certain data or resources.

2. Reliability: Prevent bugs or malicious code in one program from crashing the entire system.

3. Fairness: Make sure resources (like CPU, memory, etc.) are shared properly among users/programs.

4. Security: Block unauthorized access and protect sensitive data from hackers or misuse.

Principles of Protection

Principles of Protection:

1. Least Privilege: Give each program or user only the access they absolutely need-nothing more.

2. Separation of Privilege: Require multiple conditions (like passwords or approvals) to access important

resources.

3. Fail-Safe Defaults: By default, deny access to everything; only allow it when specifically given.

4. Economy of Mechanism: Keep the protection system simple so it's easier to manage and less likely to

have bugs.

5. Complete Mediation: Every time someone tries to access a resource, check their permission-don't just trust

earlier checks.

6. Open Design: The security should not rely on secret methods; the system should be secure even if

everyone knows how it works.

You might also like