100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Class notes

Introduction to Operating System Security

Rating
-
Sold
-
Pages
11
Uploaded on
27-09-2025
Written in
2024/2025

Topic 3: Operating System Security Dive into the heart of the computer to understand how to secure the operating system itself. OS Security Principles: - Understand OS security as the process of ensuring OS integrity, confidentiality, and availability. - Learn about key security components, including the Kernel, Reference Monitor, and the Trusted Computing Base (TCB). - Define Hardening: the process of making an OS more secure by removing unnecessary features and applying security configurations. Windows Security:Explore critical Windows security components like the Security Account Manager (SAM), Active Directory, WinLogon, and NetLogon. - Learn about client-side vulnerabilities, noting that in 2017, 70% of attacks exploited flaws in Microsoft Office. - Covers both consumer security features (Microsoft Defender, Windows Hello) and enterprise-level tools for identity, threat, and information protection. Linux and Android Security: - Understand why Linux security is so important as the OS for most mobile and IoT devices. - Includes a case study on Harbian, a hardened version of the Debian Linux distribution. - Examine the vast attack surface of an Android phone, from WiFi and Bluetooth to the kernel itself. File Systems & Virtualization: - Get a clear explanation of file systems (e.g., FAT32, ext4, APFS), their attributes, and directory structures. - Learn the difference between a Virtual Machine (VM), which runs a full OS, and a Container, which is more lightweight and shares the host kernel. - Analyze the unique attack routes present in virtualized environments, such as container-to-host attacks. Includes 6 quizzes and assignments with answers to test your knowledge on hardening, file systems, Windows security history, Linux, the Android attack surface, and VMs vs. Containers.

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Unknown
Course

Document information

Uploaded on
September 27, 2025
Number of pages
11
Written in
2024/2025
Type
Class notes
Professor(s)
Matthew kingyee
Contains
All classes

Subjects

Content preview

Filesystems & windows

, Operating systems (OS): Windows & OS hardening
- OS is a vital component in any computing system that manages computer hardware
resources and provides service to competing programs
- OS is a set of programs that operates the resources of computer hardware and
performs basic computer program services
- Critical part of the computer system
- Application system typically requires a functional operating system
- e.g. Microsoft Window 10, Linux, Unix, Apple Mac OS
- OS security: a process of ensuring OS integrity, confidentiality and availability
- Includes all precautionary control techniques that help protect any computer
resources that might be taken away/ rewritten/ removed if the safety of the OS is
breached
- Why we need: most modern systems are globally accessible through an internet
connection -> very few stand-alone computer system environments
- Creates lot of security risks & allows malicious attackers/ exploit security
loopholes
- OS protection: various measures/ procedures often used to protect the OS from
intruders/ attacks
- Key component of secure OS:
- Kernel: executes the services at the lowest level
- Security kernel: managing all OS’s security processes
- Reference monitor: component of security kernel & manage
access to the device
- Trusted computing base (TCB): has everything needed to enforce the
security policies of the OS (Security kernel + Reference monitor)
- Security Reference Monitor (SRM): element of kernel mode which executes
access checks
- Sets audit log entries & manipulates privileges
- Performs every permission check
- Local Security Authority (LSA): for executing windows local security policies
- & publishes users authentication tokens as they sign into the network
- Include authentication policy & privileged parameters
- Security Account Manager (SAM): a database that stores user credentials &
related individual user & local community sensitive data
- When user signs in via local counter device -> requires user account
details & check their SAM server
- Active Directory: critical component of how Windows manage and operates
- Effective both for handling Cloud workflows & monitoring in-house
network identification & encryption control
- WinLogon & NetLogon
- WinLogon: manages local input logins
- NetLogon: manages network wide logins
- Client side vulnerabilities in OS
- Primarily in Windows
$7.56
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
milanamhy25

Also available in package deal

Get to know the seller

Seller avatar
milanamhy25 Goldsmiths, University of London
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
10 months
Number of followers
0
Documents
6
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions