Научная статья на тему 'FEATURES OF THE PROTECTED OPERATING SYSTEM'

FEATURES OF THE PROTECTED OPERATING SYSTEM Текст научной статьи по специальности «Компьютерные и информационные науки»

CC BY
22
4
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
operating system / identification / authentication / authorization / audit / cryptography / операционная система / идентификация / аутентификация / авторизация / аудит / криптография

Аннотация научной статьи по компьютерным и информационным наукам, автор научной работы — Zakirova S.A.

The article talks about approaches to creating a secure operating system.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

ОСОБЕННОСТИ ЗАЩИЩЕННОЙ ОПЕРАЦИОННОЙ СИСТЕМЫ

В статье говорится о подходах к созданию защищенной операционной системы.

Текст научной работы на тему «FEATURES OF THE PROTECTED OPERATING SYSTEM»

УДК 004.056.53

Zakirova S.A.

Candidate of Technical Sciences Head of the Department of Informatics and Management

National Institute of Art and Design FEATURES OF THE PROTECTED OPERATING SYSTEM

Abstract: The article talks about approaches to creating a secure operating system.

Keywords: operating system, identification, authentication, authorization, audit, cryptography

Закирова С.А., к.техн.н. заведующая кафедрой «Информатики и менеджмента» Национальный Институт Художества и Дизайна ОСОБЕННОСТИ ЗАЩИЩЕННОЙ ОПЕРАЦИОННОЙ

СИСТЕМЫ

Аннотация: в статье говорится о подходах к созданию защищенной операционной системы.

Ключевые слова: операционная система, идентификация, аутентификация, авторизация, аудит, криптография.

Various applications are used to protect the information system. They require operating system support. The environment of the operating system is called a reliable computing base, provides protection, guidance, network resources, physical protection even organizational elements in the information system.

The operating system is considered protected if it is protected from the main threat means.

As part of a secure operating system, there are various prohibitions on accessing different network resources if there is a threat of access violation, so the user must have a security feature on the network. In addition, measures should be taken against the accidental shutdown of the operating system.

If the operating system is not protected from all threats, but from certain threats, then such an operating system is called a partially protected operating system.

In creating a secure operating system, there are 2 basic approaches -fragmented and complex.

A fragmented approach is protection first from one threat, only then from another.

An integrated approach is protection, which is implemented in the operating system together with the architecture and is an integral part of the system. Therefore, this approach is very important.

Protection of the operating system must be provided by appropriate application devices.

Basic means of administrative protection:

1. The operating system must always work properly

2. Have adequate policies and support for protection. This will protect the system from malevolent personalities. And it protects the operating system from violations.

3. The user must observe the precautionary measures to monitor this process.

4. Regular creation and updating of backup applications of operating systems

5. Configuration control in both protection and operating system

It should be noted and other means of protection.

Identification, authentication and authorization. In a secure operating system, each user must first perform authentication, authentication, and then authorization before work. This system is called an authentication information system. The work of the system begins only after these processes. Authorization of the subject is not connected, directly with a specific system. During the authorization, technical tasks related to the authorized and authenticated users are solved by the subject.

Prohibition of use. Each system has its own prohibitions and permission to access. A user object is a specific restriction in the use. Under the equipment resources (processor, segments) of the operating system, printer, disks, etc., and software characters is understood as a user object. For example, the processor performs the task task, the segments of the operating system can be read and written. A system consisting of magnetic cards can only be read, and files are written, read and added at the end of the file, an information system and similar tasks can be added.

Under the user's subject, the actions performed on the object are changed. But the logical name of the task is to consider the user performing the user subject. The prohibition in the movement of use is established by the security policy of the operating system.

Audit. In the use of audit in the operating system, a log is kept in which all violations are noted. The user who has the right to read this magazine is called auditors. Cases that create dangerous situations in operating systems:

1) input or output from the system;

2) Actions on files (opening, hiding, renaming, deleting);

3) access to a remote system;

4) change of privileges and other security attributes (custom).

If all violations are noted in the audit log, the amount of information is growing. Therefore, users and cases are elected.

In the information system, the security policy should always be in an adequate state.

Cryptographic functions. In the protection of the information system, the role of cryptography is very important.

System functions. Modern operating systems often work in local and global

"MnpoBaH HayKa" №5(14) 2018 science-j.com

computer networks. In order to meet modern security standards, modern operating systems must have the above parameters.

The most dangerous for today is the unauthorized use of a computer, so all modern computers are equipped with partially protected operating systems. The user must take care of himself to protect personal information using appropriate software.

References:

1. Шаньгин В.Ф. Информационная безопасность. М: ДМК Пресс, 2014.

2. Платонов В.В. Программно-аппаратные средства защиты информации: учебник для студ. Учреждений выс. Образования/ - М.: Издательский центр «Академия», 2014.

3. Мельников Д.А. Информационная безопасность открытых систем: учебник / -М.: Флинта: Наука, 2013.

4. Stamp, Mark. Information security: principles and practice / Mark Stamp/ -2nd ed. ISBN 978-0-4-470-62639-9(hardback)/ QA76.9.A25S69, USA, 2011.

i Надоели баннеры? Вы всегда можете отключить рекламу.