100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Notas de lectura

Introduction to Operating System Security

Puntuación
-
Vendido
-
Páginas
11
Subido en
27-09-2025
Escrito en
2024/2025

Topic 3: Operating System Security Dive into the heart of the computer to understand how to secure the operating system itself. OS Security Principles: - Understand OS security as the process of ensuring OS integrity, confidentiality, and availability. - Learn about key security components, including the Kernel, Reference Monitor, and the Trusted Computing Base (TCB). - Define Hardening: the process of making an OS more secure by removing unnecessary features and applying security configurations. Windows Security:Explore critical Windows security components like the Security Account Manager (SAM), Active Directory, WinLogon, and NetLogon. - Learn about client-side vulnerabilities, noting that in 2017, 70% of attacks exploited flaws in Microsoft Office. - Covers both consumer security features (Microsoft Defender, Windows Hello) and enterprise-level tools for identity, threat, and information protection. Linux and Android Security: - Understand why Linux security is so important as the OS for most mobile and IoT devices. - Includes a case study on Harbian, a hardened version of the Debian Linux distribution. - Examine the vast attack surface of an Android phone, from WiFi and Bluetooth to the kernel itself. File Systems & Virtualization: - Get a clear explanation of file systems (e.g., FAT32, ext4, APFS), their attributes, and directory structures. - Learn the difference between a Virtual Machine (VM), which runs a full OS, and a Container, which is more lightweight and shares the host kernel. - Analyze the unique attack routes present in virtualized environments, such as container-to-host attacks. Includes 6 quizzes and assignments with answers to test your knowledge on hardening, file systems, Windows security history, Linux, the Android attack surface, and VMs vs. Containers.

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Estudio
Desconocido
Grado

Información del documento

Subido en
27 de septiembre de 2025
Número de páginas
11
Escrito en
2024/2025
Tipo
Notas de lectura
Profesor(es)
Matthew kingyee
Contiene
Todas las clases

Temas

Vista previa del contenido

Filesystems & windows

, Operating systems (OS): Windows & OS hardening
- OS is a vital component in any computing system that manages computer hardware
resources and provides service to competing programs
- OS is a set of programs that operates the resources of computer hardware and
performs basic computer program services
- Critical part of the computer system
- Application system typically requires a functional operating system
- e.g. Microsoft Window 10, Linux, Unix, Apple Mac OS
- OS security: a process of ensuring OS integrity, confidentiality and availability
- Includes all precautionary control techniques that help protect any computer
resources that might be taken away/ rewritten/ removed if the safety of the OS is
breached
- Why we need: most modern systems are globally accessible through an internet
connection -> very few stand-alone computer system environments
- Creates lot of security risks & allows malicious attackers/ exploit security
loopholes
- OS protection: various measures/ procedures often used to protect the OS from
intruders/ attacks
- Key component of secure OS:
- Kernel: executes the services at the lowest level
- Security kernel: managing all OS’s security processes
- Reference monitor: component of security kernel & manage
access to the device
- Trusted computing base (TCB): has everything needed to enforce the
security policies of the OS (Security kernel + Reference monitor)
- Security Reference Monitor (SRM): element of kernel mode which executes
access checks
- Sets audit log entries & manipulates privileges
- Performs every permission check
- Local Security Authority (LSA): for executing windows local security policies
- & publishes users authentication tokens as they sign into the network
- Include authentication policy & privileged parameters
- Security Account Manager (SAM): a database that stores user credentials &
related individual user & local community sensitive data
- When user signs in via local counter device -> requires user account
details & check their SAM server
- Active Directory: critical component of how Windows manage and operates
- Effective both for handling Cloud workflows & monitoring in-house
network identification & encryption control
- WinLogon & NetLogon
- WinLogon: manages local input logins
- NetLogon: manages network wide logins
- Client side vulnerabilities in OS
- Primarily in Windows
$7.56
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
milanamhy25

Documento también disponible en un lote

Conoce al vendedor

Seller avatar
milanamhy25 Goldsmiths, University of London
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
10 meses
Número de seguidores
0
Documentos
6
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes