[go: up one dir, main page]

0% found this document useful (0 votes)
23 views13 pages

Security OS

The document outlines the importance of operating system (OS) security, emphasizing that a compromised OS can lead to unauthorized access and data exposure. It details key security goals such as authentication, authorization, confidentiality, integrity, and availability, along with built-in security features like User Account Control and file permissions. Additionally, it highlights common OS-level threats and the necessity of regular updates and patch management to mitigate vulnerabilities.

Uploaded by

Abdullah Azar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views13 pages

Security OS

The document outlines the importance of operating system (OS) security, emphasizing that a compromised OS can lead to unauthorized access and data exposure. It details key security goals such as authentication, authorization, confidentiality, integrity, and availability, along with built-in security features like User Account Control and file permissions. Additionally, it highlights common OS-level threats and the necessity of regular updates and patch management to mitigate vulnerabilities.

Uploaded by

Abdullah Azar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Security

(D/618/7406 )
Operating System Security Concepts and Features
Assess risks to IT security

O. K. B. Kavsilu
BSc. (Hons.) in Computer Science (Kingston, UK), Cert. in IT (BCS, UK)
Why OS Security Matters
• The operating system (OS) is the heart of any computing
environment.
• If the OS is compromised:
• Attackers can bypass application-level controls
• Malware can gain administrative or root access
• Confidential data (files, passwords) can be exposed

• Protecting the OS is foundational to securing the entire system.


Key OS Security Goals
• Authentication – Verify user identity using credentials (e.g., passwords,
biometrics)
• Authorisation – Grant access to resources only to permitted users
• Confidentiality – Prevent unauthorised data access
• Integrity – Ensure system and data are not altered maliciously
• Availability – Keep systems operational and accessible

• These goals reflect the CIA Triad: Confidentiality, Integrity, Availability


Built-In OS Security Features
• Common OS Security Components:
• User Account Control (UAC) – Prevents unauthorised changes
• File Permissions and ACLs – Control access to files/folders
• System Event Logs – Track activity for auditing
• Password Policies – Enforce strong authentication
• Automatic Updates – Patch known vulnerabilities
• Security Configuration Tools – Manage policies and restrictions

• Modern operating systems have built-in security frameworks by default.


User Account Control (UAC)
• Introduced in Windows Vista, still essential today
• Prevents software from making system-level changes without permission
• Displays a prompt when elevated privileges are required

• Helps enforce least privilege access – a key security principle


File System Permissions
• OS file systems use Access Control Lists (ACLs) to determine:
• Who owns a file or folder
• What actions users/groups can perform: read, write, execute, delete

• Linux uses chmod/chown, Windows uses NTFS permissions


• Misconfigured permissions are a top cause of unauthorised data exposure.
System Logs and Auditing
• System logs capture vital events:
• Login attempts
• Software installations
• Security breaches or errors
• Benefits:
• Identify patterns of attack
• Support forensic investigations
• Ensure compliance with policies

• Always review and protect your logs from tampering.


Password and Authentication Policies
• Strong authentication helps prevent brute-force, phishing, and unauthorised
access.
• Policies include:
• Enforcing minimum length and complexity
• Password expiration and history tracking
• Account lockout after failed attempts
• Two-factor authentication (2FA/MFA)
• Passwords are your first barrier – make them count!
OS Security Updates and Patch Management
• Operating systems regularly release patches to fix:
• Vulnerabilities exploited by malware
• System bugs and performance issues
• Patch Management Tips:
• Enable automatic updates where possible
• Schedule regular update checks
• Test updates in staging environments before deployment
• The WannaCry ransomware attack exploited unpatched Windows systems.
Security Features by OS Type
Feature Windows Linux macOS

Built-in AV Windows Defender ClamAV (optional) XProtect

User Privilege Control UAC Sudo/Su permissions Admin/root separation

Software Restriction AppLocker SELinux, AppArmor Gatekeeper

Updates Windows Update Package Managers Software Update Tool


Common OS-Level Threats
• Privilege escalation
• Rootkits and bootkits
• Exploits of unpatched vulnerabilities
• Keyloggers and spyware

• OS hardening and proactive monitoring can help mitigate these threats.


Mini Quiz
• 1. What does UAC stand for?
a) Universal Access Control
b) User Administrative Command
c) User Account Control
• 2. Which OS feature prevents unauthorised execution of unknown software on
macOS?
a) Gatekeeper
b) BitLocker
c) SELinux
Mini Quiz
• 3. Why are regular OS updates important?
a) To add new games
b) To fix bugs and security vulnerabilities
c) To increase battery life
• 4. What does the principle of least privilege mean?
a) Users should have no access to anything
b) Users should only get access necessary for their tasks
c) All users should have admin rights

You might also like