Home | Projects | Notes > Operating Systems > Operating System Security

Operating System Security

 

System Access Threats

Intruders

An intruder is a human being (or a legitimate user) somehow gained access to the system through the operating system with privileged access level that they shouldn't have.

Malicious Software

 

Countermeasures

Intrusion Detection System (IDS)

Authentication

Access Control

Firewalls

 

How Do We Get an Access to Running Software to Change it?

Cross-Site Scripting (Intentional Attack)

Buffer Overflow Attacks (Intentional Attack)

 

basic-buffer-overflow-stack-values

 

 

What Can Programming Languages Do to Prevent These Attacks?

Compile-Time Defense

Aims to harden programs to resist attacks.

Run-Time Defense

Aims to detect and abort attacks in executing programs.

 

Access Control

File System Access Control

 

Operating Systems Hardening

These are administrator's responsibility, not the OS's!

Operating System Installation: Initial Setup & Patching

Remove Unnecessary Services, Applications, and Protocols

Install Additional Security Controls

Backup / Continuous Off-site Operating Protocol (COOP)? Strategy

 

 

References

Stallings, W. (2018). Operating Systems: Internals and Design Principles (9th ed.). Pearson Education, Inc.