Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

OPERATING SYSTEM

RESEARCH PAPER
TOPIC: AUTHENTICATION ISSUES IN OS

S.M Hamza Farooqui (BSE-20S-038)


Hira Hasan (BSE-20S-016)
WHAT IS AN OPERATING SYSTEM
An Operating System (OS) is a software that acts as an interface between computer hardware components
and the user. Every computer system must have at least one operating system to run other programs.

WHY USE AN OPERATING SYSTEM


It manages the computer's memory and processes, as well as all of its software and hardware. It
also allows you to communicate with the computer without knowing how to speak the computer's
language. Without an operating system, a computer is useless.
TYPES OF AN OPERATING SYSTEM
Operating systems usually come pre-loaded on any computer you buy. Most people use the operating system
that comes with their computer, but it's possible to upgrade or even change operating systems. The three most
common operating systems for personal computers are

The most common operating system for personal computer are:


• Microsoft Windows
• Linux
• MacOS
• Android
• IOS
WHAT DOES OPERATING SYSTEM SECURITY (OS SECURITY) MEAN?
Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and availability.

OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker
intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being
stolen, edited or deleted if OS security is compromised.

OS SECURITY MAY BE APPROACHED IN MANY WAYS, INCLUDING ADHERENCE TO THE


FOLLOWING:

•PERFORMING REGULAR OS PATCH UPDATES


•INSTALLING UPDATED ANTIVIRUS ENGINES AND SOFTWARE
•SCRUTINIZING ALL INCOMING AND OUTGOING NETWORK TRAFFIC THROUGH A FIREWALL
•CREATING SECURE ACCOUNTS WITH REQUIRED PRIVILEGES ONLY (I.E., USER
MANAGEMENT)
WHAT IS AUTHENTICATION IN OPERATING SYSTEMS?

Definition:
Authentication is the process of recognizing a user's identity. ... The credentials provided are compared to those on a file in
a database of the authorized user's information on a local operating system or within an authentication server.

WHAT ARE THE POSSIBLE ISSUES IN AUTHENTICATING USERS?


• 4 User Authentication Issues Developers and Admins Struggle With (Solved)

• Getting Users to Set Strong Passwords. The passwords of nine out of every ten employees can be hacked within six
hours. ...
• Encouraging Users to Implement 2FA for Their Accounts. ...

• Preventing SMS Spoofing. ...

• The Social Sign-in Puzzle.


* WHAT ARE THE SECURITY ISSUES IN OS

Operating System - The OS must protect itself from security breaches, such as runaway processes ( denial of service
), memory-access violations, stack overflow violations, the launching of programs with excessive privileges, and many
others.

* WHAT ARE THE 5 TYPES OF AUTHENTICATION


• 5 Common Authentication Types

• Password-based authentication. Passwords are the most common methods of authentication. ...

• Multi-factor authentication. ...

• Certificate-based authentication. ...

• Biometric authentication. ...

• Token-based authentication.
* WHAT ARE 3 FACTORS OF AUTHENTICATION
There are three authentication factors that can be used: 
• something you know,

• something you have,

• and something you are.

Something you know would be a password, a PIN, or some other personal information.
* TYPES / METHODS OF AN AUTHENTICATION

• Single-Factor/Primary Authentication. ...


• Two-Factor Authentication (2FA) ...
• Single Sign-On (SSO) ...
• Multi-Factor Authentication (MFA) ...
• Password Authentication Protocol (PAP) ...
• Challenge Handshake Authentication Protocol (CHAP) ...
• Extensible Authentication Protocol (EAP)
* WHAT IS 3 STEP VERIFICATION METHOD?
Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of
authentication factors – typically, the knowledge, possession and inherence categories. Multifactor authentication
dramatically improves security.

* WHAT IS THE MOST COMMON FORM OF AUTHENTICATION


Password:
The use of a user name and password provides the most common form of authentication. You enter your name
and password when prompted by the computer. It checks the pair against a secure file to confirm.
* WHICH OF THE FOLLOWING METHODS ARE AN EXAMPLE OF
MULTIFACTOR AUTHENTICATION?
A multi-factor authentication example of something the user has could include: Google
Authenticator (an app on your phone). SMS text message with a code. Soft token (also called
software token)
THANKS

You might also like