ch11 - Chapter 11 Security and Ethics Understanding...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 11 Security and Ethics Understanding Operating Systems, Fourth Edition
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Understanding Operating Systems, Fourth Edition 2 Objectives Objectives You will be able to describe: The role of the operating system with regard to system security The effects of system security practices on overall system performance The levels of system security that can be implemented and the threats posed by evolving technologies The differences between computer viruses and worms, and how they spread The difficulties of teaching ethics to user groups and the role of education in system security
Background image of page 2
Understanding Operating Systems, Fourth Edition 3 Role of the Role of the Operating System in Security Operating System in Security Operating system plays a key role in computer system security Any vulnerability at the operating system level opens the entire system to attack The more complex and powerful the operating system, the more likely it is to have vulnerabilities to attack System administrators must be on guard to arm their operating systems with all available defenses against attack
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Understanding Operating Systems, Fourth Edition 4 System Survivability System Survivability Capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents Key properties of survivable systems: Resistance to attacks Recognition of attacks and resulting damage Recovery of essential services after an attack Adaptation and evolution of system defense mechanisms to mitigate future attacks
Background image of page 4
Understanding Operating Systems, Fourth Edition 5 System Survivability System Survivability (continued) (continued) Table 11.1: Four key properties of a survivable system
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Understanding Operating Systems, Fourth Edition 6 Levels of Protection Levels of Protection Table 11.2: A simplified comparison of security protection required for three typical computer configurations System administrator must evaluate the risk of intrusion for each computer configuration, which in turn depends on the level of connectivity given to the system
Background image of page 6
Understanding Operating Systems, Fourth Edition 7 Backup and Recovery Backup and Recovery Backup and recovery policies are essential for most computing systems Many system managers use a layered backup schedule Backups, with one set stored off-site, are crucial to disaster recovery Written policies and procedures and regular user training are essential elements of system management
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Understanding Operating Systems, Fourth Edition 8 Backup and Recovery Backup and Recovery Written security procedures should recommend: Frequent password changes Reliable backup procedures Guidelines for loading new software Compliance with software licenses Network safeguards Guidelines for monitoring network activity Rules for terminal access
Background image of page 8
Understanding Operating Systems, Fourth Edition 9 Security Breaches Security Breaches A gap in system security can be malicious or not
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/20/2008 for the course IST 341 taught by Professor Woldering during the Fall '08 term at Cleveland State.

Page1 / 48

ch11 - Chapter 11 Security and Ethics Understanding...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online