OS Finals Quiz Assignment TOPIC 10
OS Finals Quiz Assignment TOPIC 10
Protection’s goal is to ensure that each object in the operating system is only accessible only by
authorized and required process. This includes the prevention of malicious misuse of the system by users or
programs. To ensure that each shared resource is used only in accordance with system policies, which may be
set either by system designers or by system administrators. To ensure that malicious programs cause the
minimal amount of damage possible. Protection systems only provide the instructions for enforcing policies
and ensuring reliable systems. It is up to administrators and users to implement and follow those instructions
effectively. The principle of least privilege dictates that programs, users, and systems be given just enough
privileges to perform their tasks. This ensures that failures do the least amount of harm and allow the least of
harm to be done. For example, if a program needs special privileges to perform a task, it is better to make it
program with group ownership of "network" or "backup" or some other pseudo group, rather than with root
ownership. This limits the amount of damage that can occur if something goes wrong.
2. Explain how protection domains combined with access matrix are used to specify the resources a process may
access.
In a capability-based system, the capabilities themselves are passed between processes and storage
using a mechanism that is known by the operating system to maintain the integrity of those capabilities. Data
capability - provides standard read, write, execute of individual storage segments associated with object
Software capability -interpretation left to the subsystem, through its protected procedures. Language-Based
Protection Specification of protection in a programming language allows the high-level description of policies for
the allocation and use of resources Language implementation can provide software for protection enforcement
when automatic hardware-supported checking is unavailable Interpret protection specifications to generate
calls on whatever protection system is provided by the hardware and the operating system.
In this question, I would like to relate it to the protection in Java 2. Java was designed from the very
beginning to operate in a distributed environment, where code would be executed from a variety of trusted and
untrusted sources. As a result the Java Virtual Machine, JVM incorporates many protection mechanisms. When a
Java program runs, it load up classes dynamically, in response to requests to instantiates objects of particular
types. These classes may come from a variety of different sources, some trusted and some not, which requires
that the protection mechanism be implemented at the resolution of individual. As each class is loaded, it is
placed into a separate protection domain. The capabilities of each domain depend upon whether the source URL
is trusted or not, the presence or absence of any digital signatures on the class ( Chapter 15 ), and a configurable
policy file indicating which servers a particular user trusts, etc.