Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
35 views

OSS SYLABUS

The document outlines a course on Operating Systems and Security, covering fundamental concepts such as process management, memory management, file systems, and security models. It includes practical exercises related to UNIX commands, CPU scheduling algorithms, and security implementations. The course also references key textbooks and literature in the field of operating systems and security.

Uploaded by

sharmila11121311
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

OSS SYLABUS

The document outlines a course on Operating Systems and Security, covering fundamental concepts such as process management, memory management, file systems, and security models. It includes practical exercises related to UNIX commands, CPU scheduling algorithms, and security implementations. The course also references key textbooks and literature in the field of operating systems and security.

Uploaded by

sharmila11121311
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CB3402 OPERATING SYSTEMS AND SECURITY L T PC

3024
Aim Of Concept:
 To understand the basic concepts of Operating Systems.
 To explore the process management concepts including scheduling,
synchronization, threads and deadlock.
 To understand the memory, file and I/O management activities of OS.
 To understand the requirements of a trust model.
 To learn how security is implemented in various operating systems.
Unit I: Operating System Overview
Computer-System Organization – Architecture – Operating-System Operations
– Resource Management – Security and Protection – Distributed Systems –
Kernel Data Structures – Operating-System Services – System Calls – System
Services – Why Applications Are Operating System Specific – Operating-
System Design and Implementation – Operating-System Structure – Building
and Booting an Operating System.
Unit II: Process Management
Process Concept – Process Scheduling – Operation on Processes, Inter-process
Communication – Threads – Overview – Multithreading models – Threading
issues; CPU Scheduling – Scheduling criteria, Scheduling algorithms; Process
Synchronization – critical-section problem, Synchronization hardware, Mutex
locks, Semaphores, Critical regions, Monitors; Deadlock – System model,
Deadlock characterization, Methods for handling deadlocks, Deadlock
prevention, Deadlock avoidance, Detection, Recovery.
Unit III: Memory Management and File Systems
Main Memory – Background, Swapping, Contiguous Memory Allocation,
Paging, Segmentation – Virtual Memory – Demand Paging, Page Replacement,
Allocation, Thrashing; Allocating Kernel Memory. Mass Storage system – HDD
Scheduling – File concept, Access methods, Directory Structure, Sharing and
Protection; File System Structure, Directory implementation, Allocation
Methods, Free Space Management.
Unit IV: Secure Systems and Verifiable Security Goals
Security Goals – Trust and Threat Model – Access Control Fundamentals –
Protection System – Reference Monitor – Secure Operating System Definition –
Assessment Criteria – Information Flow – Information Flow Secrecy Models –
Denning’s Lattice Model – Bell LaPadula Model – Information Flow Integrity
Models – Biba Integrity Model – Low-Water Mark Integrity – Clark Wilson
Integrity
Unit V: Security In Operating Systems
UNIX Security – UNIX Protection System – UNIX Authorization – UNIX
Security Analysis – UNIX Vulnerabilities – Windows Security – Windows
Protection System – Windows Authorization – Windows Security Analysis –
Windows Vulnerabilities – Address Space Layout Randomizations –
Retrofitting Security into a Commercial Operating System – Introduction to
Security Kernels.
Practical Exercises:
1. Basics of UNIX commands, Understand and practice Linux permissions,
special permissions and authentication (various options of chmod, setuid,
setgid)
2. Write programs using the following system calls of UNIX operating
system a. fork, exec, getpid, exit, wait, close, stat, opendir, readdir
3. Write C programs to implement the various CPU Scheduling Algorithms
4. Implementation of Semaphores
5. Implementation of Shared memory
6. Bankers Algorithm for Deadlock Detection &Avoidance
7. Implementation of the following Memory Allocation Methods for fixed
partition
a) First Fit b) Worst Fit c) Best Fit
8. Implementation of the following Page Replacement Algorithms
a) FIFO b) LRU c) LFU
9. Program to demonstrate the working of Bell LaPadula Model and Biba
Integrity Model
10.Setting up access control lists of files and directories and testing the lists
in Linux
11.Learn to enable and disable address space layout randomization
Textbook:
1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating
System Concepts”, John Wiley & Sons, Inc., 10th Edition, 2021.
2. Trent Jaeger, Operating System Security, Morgan & Claypool Publishers
series, 2008.
References:
1. Morrie Gasser, “Building A Secure Computer System”, Van Nostrand
Reinhold, New York, 1988.
2. Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, “Security in
Computing”, Fifth Edition, Prentice Hall, New Delhi, 2015.
3. William Stallings, “Operating Systems – Internals and Design
Principles”, 9th Edition, Pearson, 2017.
4. Michael Palmer, “Guide to Operating Systems Security”, Course
Technology – Cengage Learning, New Delhi, 2008.

You might also like