ENVS 1500 Lecture 2: ENVS 1500 Tutorial 2 Notes
ENVS 1500 Tutorial 2 Notes – Security and Protection Services
Introduction
• Larger computers used for server applications often require the capability for additional
growth and reliability to serve the needs of their clients.
• These capabilities are sometimes referred to as system scalability and fail-safe operation
respectively.
• In addition to networking support, the operating systems for such machines often
include clustering software
• So that these computers can be clustered together and viewed transparently by clients
and users as a single, high-powered system
• The clustering software provides single-point logins, single-point user and client
requests, request steering, failure detection and cutover, and system load balancing
between the individual nodes within the cluster.
• It is certainly no surprise to anyone that modern systems require security and protection
services to protect the operating system from user processes, to protect processes from
each other
• To protect all processes from the outside world
• Without protection, a buggy or malicious program
• For example, could unintentionally or intentionally modify or destroy the program code
or data in the memory space belonging to the operating system or to another process.
• It is also important to protect the system and user processes from unauthorized entry to
the system, and against unauthorized use of the system, even by authorized users.
• In most modern systems, executing processes are limited to the execution of
instructions and access to data within their own memory space.
• All other services, such as file management and I/O, must be requested by the process
from the operating system, using the service requests provided by the OS for that
purpose.
• This methodology is fundamental to the security of the system.
find more resources at oneclass.com
find more resources at oneclass.com