Professional Documents
Culture Documents
Os Notes
Os Notes
Os Notes
In this chapter, we will discuss in detail about file permission and access modes in UNIX.
File ownership is an important component of UNIX that provides a secure method for
storing files. Every file in UNIX has the following attributes −
Owner permissions − The owner's permissions determine what actions the owner of
the file can perform on the file.
Group permissions − The group's permissions determine what actions a user, who is
a member of the group that a file belongs to, can perform on the file.
Other (world) permissions − The permissions for others indicate what action all
other users can perform on the file.
1. The policies define how processes access the computer system's resources, such as the
CPU, memory, software, and even the operating system. It is the responsibility of
both the operating system designer and the app programmer. Although, these policies
are modified at any time.
2. Protection is a technique for protecting data and processes from harmful or intentional
infiltration. It contains protection policies established by it, set by management or
imposed individually by programmers to ensure that their programs are protected to
the greatest extent possible.
3. It also provides a multiprogramming OS with the security that its users expect when
sharing common space such as files or directories.
Cryptography and its Types
Cryptography is technique of securing information and communications through use of
codes so that only those people for whom the information is intended can understand it and
process it. Thus preventing unauthorized access to information. The prefix “crypt” means
“hidden” and suffix graphy means “writing”.
In Cryptography the techniques which are use to protect information are obtained
from mathematical concepts and a set of rule based calculations known as algorithms to
convert messages in ways that make it hard to decode it. These algorithms are used for
cryptographic key generation, digital signing, and verification to protect data privacy, web
browsing on internet and to protect confidential transactions such as credit card and debit
card transactions
Cryptography is classified into
1. Symmetric cryptography,
2. Asymmetric cryptography
3. Hashing.
Below is the description of these types.
3. Hashing –
It involves taking the plain-text and converting it to a hash value of fixed size by a
hash function. This process ensures integrity of the message as the hash value on both,
sender\’s and receiver\’s side should match if the message is unaltered.
Features of Cryptography are as follows:
1. Confidentiality:
Information can only be accessed by the person for whom it is intended and no other
person except him can access it.
2. Integrity:
Information cannot be modified in storage or transition between sender and intended
receiver without any addition to information being detected.
3. Non-repudiation:
The creator/sender of information cannot deny his intention to send information at later
stage.
4. Authentication:
The identities of sender and receiver are confirmed. As well as destination/origin of
information is confirmed.
What Is Authentication?
Authentication is the process of identifying users that request access to a system, network, or
device. Access control often determines user identity according to credentials like username
and password. Other authentication technologies like biometrics and authentication apps are
also used to authenticate user identity.
1. Password-based authentication
Passwords are the most common methods of authentication. Passwords can be in the form of
a string of letters, numbers, or special characters. To protect yourself you need to create
strong passwords that include a combination of all possible options.
However, passwords are prone to phishing attacks and bad hygiene that weakens
effectiveness. An average person has about 25 different online accounts, but only 54% of
users use different passwords across their accounts.
The truth is that there are a lot of passwords to remember. As a result, many people choose
convenience over security. Most people use simple passwords instead of creating reliable
passwords because they are easier to remember.
The bottom line is that passwords have a lot of weaknesses and are not sufficient in
protecting online information. Hackers can easily guess user credentials by running through
all possible combinations until they find a match.
2. Multi-factor authentication
The certificate contains the digital identity of a user including a public key, and the
digital signature of a certification authority. Digital certificates prove the ownership of a
public key and issued only by a certification authority.
Users provide their digital certificates when they sign in to a server. The server verifies
the credibility of the digital signature and the certificate authority. The server then uses
cryptography to confirm that the user has a correct private key associated with the certificate.
4. Biometric authentication
5. Token-based authentication
Token-based authentication technologies enable users to enter their credentials once and
receive a unique encrypted string of random characters in exchange. You can then use the
token to access protected systems instead of entering your credentials all over again. The
digital token proves that you already have access permission. Use cases of token-based
authentication include RESTful APIs that are used by multiple frameworks and clients.
A computer virus is a program which can harm our device and files and infect them for
no further use. When a virus program is executed, it replicates itself by modifying other
computer programs and instead enters its own coding. This code infects a file or program and
if it spreads massively, it may ultimately result in crashing of the device.
Across the world, Computer viruses are a great issue of concern as they can cause
billions of dollars’ worth harm to the economy each year.
Since the computer virus only hits the programming of the device, it is not visible. But
there are certain indications which can help you analyse that a device is virus-hit. Given
below are such signs which may help you identify computer viruses:
Speed of the System – In case a virus is completely executed into your device, the
time taken to open applications may become longer and the entire system processing
may start working slowly
Pop-up Windows – One may start getting too many popup windows on their screen
which may be virus affected and harm the device even more
Log out from Accounts – In case of a virus attack, the probability of accounts getting
hacked increase and password protected sites may also get hacked and you might get
logged out from all of them
Crashing of the Device – In most cases, if the virus spreads in maximum files and
programs, there are chances that the entire device may crash and stop working
Types of Computer Virus
Discussed below are the different types of computer viruses:
Boot Sector Virus – It is a type of virus that infects the boot sector of floppy disks or
the Master Boot Record (MBR) of hard disks. The Boot sector comprises all the files
which are required to start the Operating system of the computer. The virus either
overwrites the existing program or copies itself to another part of the disk.
Direct Action Virus – When a virus attaches itself directly to a .exe or .com file and
enters the device while its execution is called a Direct Action Virus. If it gets installed
in the memory, it keeps itself hidden. It is also known as Non-Resident Virus.
Resident Virus – A virus which saves itself in the memory of the computer and then
infects other files and programs when it’s originating program is no longer working.
This virus can easily infect other files because it is hidden in the memory and is hard
to be removed from the system.
Multipartite Virus – A virus which can attack both, the boot sector and the
executable files of an already infected computer is called a multipartite virus. If a
multipartite virus attacks your system, you are at risk of cyber threat.
Overwrite Virus – One of the most harmful viruses, the overwrite virus can
completely remove the existing program and replace it with the malicious code by
overwriting it. Gradually it can completely replace the host’s programming code with
the harmful code.
Polymorphic Virus – Spread through spam and infected websites, the polymorphic
virus are file infectors which are complex and are tough to detect. They create a
modified or morphed version of the existing program and infect the system and retain
the original code.
File Infector Virus – As the name suggests, it first infects a single file and then later
spreads itself to other executable files and programs. The main sources of this virus
are games and word processors.
Spacefiller Virus – It is a rare type of virus which fills in the empty spaces of a file
with viruses. It is known as cavity virus. It will neither affect the size of the file nor
can be detected easily.
Macro Virus – A virus written in the same macro language as used in the software
program and infects the computer if a word processor file is opened. Mainly the
source of such viruses is via emails.