Font Size: a A A

A Study On The Security Technique Of Operating System And Optimizing Scheme

Posted on:2006-08-21Degree:MasterType:Thesis
Country:ChinaCandidate:K WangFull Text:PDF
GTID:2178360182472671Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Along with the important information networks interconnected with Internet, such as the finance, government affairs, commercial affairs, Internet—the global information networks, has already played a more and more important role in the aspect of politics and economy. Meanwhile, these important information network systems face the threat attacked in invasion, and the loophole of operating systems and applications is the foundation of attack implemented by attacker.Operating system is the basic software dealing with the computer hardware directly, a direct administrator of computer resources. The security of operating system is the foundation of other application software securities. Lacked this safe foundation, application systems and security systems constructed on it can not get the basic guarantee. In the environment of the network, the security depends on that every host computer system can be believed; without security of the operating system, there will be not the securities of host computer systems and network system So, the security of operating system is the foundation of the whole computer system. If there is not the security of operating system, it can not really solve the problem of information security.To the threat and attack, we must adopt the effective security mechanism to protect, defend and strike back. A good operating system should be very strong securities, high dependability; and must have corresponding security mechanism and protective measure to prohibit or limit the trapdoor, Trojan Horse; and offer enough safe protection to the information resources to prevent the abuse of the unauthorized user.This text has introduced the importance of the operating system in the information system security at first, the main security technology of the operating system, and the security classification standard; we have discussed the common threat and attack that the operating system faces as the foundation of the information system in detail. For instance, the Trojan Horse attack, login deception, computer virus, etc. The process of threat and attack to these has been researched deeply. The security demand is proposed for the operating system security research; To the threat the operating system faced, the main-security technology and implement are researched on the basis of understanding the mechanism threatened to produce, For instance, user authentication mechanism, access control mechanism, memory protection and I/O protective measure, etc. Some deficiencies of the user authentication schemes have been pointed out and improving idea is been put forward. To the choices of the question and answer in the challenge-response authentication, propose some precautions of uses, make it easy for the use of the scheme, point out the risk of authentication using intelligent card singly at the same time, put forward the method that combine intelligent card and safe password.The security mechanism and technology of Windows2000 operating system are researched in detail, included the security system components, security auditing mechanism and security login, the protecting objects of Windows2000.And an optimizing scheme is proposed for Windows2000. Finally summarize full text and outlook technology.
Keywords/Search Tags:Security Mechanism, Threat, User Authentication, Access Control, Security Identifiers
PDF Full Text Request
Related items