The security of software includes security of both application programs and system software. From the security viewpoint, Operating System (O.S.) is the most important which controls and monitors the entire system. If the system software has been designed with adequate security protection features, different types of computer abuse and malpractice can be prevented.
The operating system shouild include a set of security features to provide automatic protection. Generally, the manufacturer incorporates security features as a part of the operating system or they are added as a security package to the operating system.
The software having proper security system is able to :
1. Identify each and every system user.
2. Maintain a log of all usage and alert appropriate staff in case of breaking of security rules.
3. Maintain properly the access control over data, program, resources so that only the authorized user are allowed to access them.
Next approach to the security of the software is the kevnel approach. A security kevnel is a hardware and software implementation of the concept that enforces formal security rules in a computer system. It is able to control access of users, programs and processes. The advantage of such kevnel is that it can be separated from the operating system or the security mechanism may be isolated from the operating systems.
The security packages are added to the IBM operating system to give more security.
Examples of security packages are : SECURE RACE (Resource Access Control facility). Such packages provide control over access to the system (i.e. all users are identified). Then, they control access to data sets and to other system resources. They can record logging information in the Standard System Monitor File (S.S.M.F.).
The operating system shouild include a set of security features to provide automatic protection. Generally, the manufacturer incorporates security features as a part of the operating system or they are added as a security package to the operating system.
The software having proper security system is able to :
1. Identify each and every system user.
2. Maintain a log of all usage and alert appropriate staff in case of breaking of security rules.
3. Maintain properly the access control over data, program, resources so that only the authorized user are allowed to access them.
Next approach to the security of the software is the kevnel approach. A security kevnel is a hardware and software implementation of the concept that enforces formal security rules in a computer system. It is able to control access of users, programs and processes. The advantage of such kevnel is that it can be separated from the operating system or the security mechanism may be isolated from the operating systems.
The security packages are added to the IBM operating system to give more security.
Examples of security packages are : SECURE RACE (Resource Access Control facility). Such packages provide control over access to the system (i.e. all users are identified). Then, they control access to data sets and to other system resources. They can record logging information in the Standard System Monitor File (S.S.M.F.).
No comments:
Post a Comment