CB3402 Operating Systems and Security Syllabus:
CB3402 Operating Systems and Security Syllabus – Anna University Regulation 2021
COURSE OBJECTIVES:
To understand the basic concepts of Operating Systems.
To explore the process management concepts including scheduling, synchronization, threads and deadlock.
To understand the memory, file and I/O management activities of OS.
To understand the requirements of a trust model.
To learn how security is implemented in various operating systems.
UNIT I OPERATING SYSTEM OVERVIEW
Computer-System Organization – Architecture – Operating-System Operations – Resource Management – Security and Protection – Distributed Systems – Kernel Data Structures – Operating-System Services – System Calls – System Services – Why Applications Are OperatingSystem Specific – Operating-System Design and Implementation – Operating-System Structure – Building and Booting an Operating System .
UNIT II PROCESS MANAGEMENT
Process Concept – Process Scheduling – Operation on Processes, Inter-process Communication – Threads – Overview – Multithreading models – Threading issues; CPU Scheduling – Scheduling criteria, Scheduling algorithms; Process Synchronization – critical-section problem, Synchronization hardware, Mutex locks, Semaphores, Critical regions, Monitors; Deadlock – System model, Deadlock characterization, Methods for handling deadlocks, Deadlock prevention, Deadlock avoidance, Detection, Recovery.
UNIT III MEMORY MANAGEMENT AND FILE SYSTEMS
Main Memory – Background, Swapping, Contiguous Memory Allocation, Paging, Segmentation – Virtual Memory – Demand Paging, Page Replacement, Allocation, Thrashing; Allocating Kernel Memory. Mass Storage system – HDD Scheduling – File concept, Access methods, Directory Structure, Sharing and Protection; File System Structure, Directory implementation, Allocation Methods, Free Space Management
UNIT IV SECURE SYSTEMS AND VERIFIABLE SECURITY GOALS
Security Goals – Trust and Threat Model – Access Control Fundamentals – Protection System – Reference Monitor – Secure Operating System Definition – Assessment Criteria – Information Flow – Information Flow Secrecy Models – Denning’s Lattice Model – Bell LaPadula Model – Information Flow Integrity Models – Biba Integrity Model – Low-Water Mark Integrity – ClarkWilson Integrity
UNIT V SECURITY IN OPERATING SYSTEMS
UNIX Security – UNIX Protection System – UNIX Authorization – UNIX Security Analysis – UNIX Vulnerabilities – Windows Security – Windows Protection System – Windows Authorization – Windows Security Analysis – Windows Vulnerabilities – Address Space Layout Randomizations – Retrofitting Security into a Commercial Operating System – Introduction to Security Kernels
45 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Basics of UNIX commands, Understand and practice Linux permissions, special permissions and authentication (various options of chmod, setuid, setgid)
2. Write programs using the following system calls of UNIX operating system
a. fork, exec, getpid, exit, wait, close, stat, opendir, readdir
3. Write C programs to implement the various CPU Scheduling Algorithms
4. Implementation of Semaphores
5. Implementation of Shared memory
6. Bankers Algorithm for Deadlock Detection &Avoidance
7. Implementation of the following Memory Allocation Methods for fixed partition
a) First Fit b) Worst Fit c) Best Fit
8. Implementation of the following Page Replacement Algorithms
a) FIFO b) LRU c) LFU
9. Program to demonstrate the working of Bell LaPadula Model and Biba Integrity Model
10. Setting up access control lists of files and directories and testing the lists in Linux
11. Learn to enable and disable address space layout randomization
COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1:To gain understanding on the concepts of Operating Systems.
CO2:To acquire knowledge on process management concepts including scheduling, synchronization, threads and deadlock.
CO3: To have understanding on memory, file and I/O management activities of OS.
CO4: To understand security issues in operating systems and appreciate the need for security models
CO5: To gain exposure to the operating systems security models of WINDOWS and UNIX OS.
TOTAL:75 PERIODS
TEXT BOOK
1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”, John Wiley & Sons, Inc., 10th Edition, 2021.
2. Trent Jaeger, Operating System Security, Morgan & Claypool Publishers series, 2008.
REFERENCES
1. Morrie Gasser, “Building A Secure Computer System”, Van Nostrand Reinhold, New York, 1988.
2. Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, “Security in Computing”, Fifth Edition, Prentice Hall, New Delhi, 2015.
3. William Stallings, “Operating Systems – Internals and Design Principles”, 9th Edition, Pearson, 2017.
4. Michael Palmer, “Guide to Operating Systems Security”, Course Technology – Cengage Learning, New Delhi, 2008.
5. Introduction to Hardware, Security and Trust, book by Mohammad Tehranipoor, Cliff Wang, Springer, 2012.
6. Gary McGraw, Software Security: Building Security In, Addison Wesley software security series, 2005.
7. Gerardus Blokdyk, Security Focused Operating System A Complete Guide – 2020 Edition, 5STARCooks, ISBN: 9781867373353, 2020.
