CS 403 - Operating Systems Reviewer
CS 403 - Operating Systems Reviewer
a. Importance of OS Security
Operating System (OS) security is crucial to protect data and resources from unauthorized
access, misuse, or attacks.
Ensures that user operations and sensitive information are shielded from potential threats.
Malware: Harmful software like viruses, trojans, and ransomware that can infect and damage
the OS.
Phishing and Social Engineering: Tactics that manipulate users into revealing confidential
information.
Privilege Escalation: Techniques that allow attackers to gain higher access than permitted.
Insider Threats: Risks from within an organization, often from users with legitimate access.
Authorization and Access Control: Defining and enforcing user permissions and roles.
Auditing and Logging: Monitoring system activities to detect and respond to suspicious actions.
d. Security Models in OS
Biba Integrity Model: Aimed at ensuring data integrity, preventing data from being modified
improperly.
Role-Based Access Control (RBAC): Assigns permissions based on user roles within the system.
Highlights the need for timely patching and updates to prevent exploitations.
Case Study 2: Heartbleed Vulnerability in OpenSSL (Linux)
Activity
Maintenance: Develop a plan for regular updates, scanning, and incident response.
4. Review Questions
Comprehension Check
1. Why is OS security important, and what are some risks associated with a lack of it?
2. Describe three types of OS security threats and provide an example for each.
3. What is the purpose of authentication, and how does it differ from authorization?
Application and Analysis 4. How does the Bell-LaPadula model differ from the Biba integrity model? 5.
Explain the role of encryption in OS security. How does it protect both data at rest and in transit? 6.
Reflect on the case study of the EternalBlue exploit. What lessons can we learn about vulnerability
management?
Project Proposal Ideas 7. If you were designing an OS for a small business, which core security
mechanisms would you prioritize, and why? 8. In a shared network environment, how would you
implement auditing and logging to detect suspicious activities?
5. Study Tips
Understand, Don’t Memorize: Focus on understanding each security mechanism’s purpose and
application rather than memorizing definitions.
Practice Real-World Scenarios: Think of ways OS security applies in everyday technology, such as
securing personal devices.
Case Studies are Key: Use case studies as a lens to understand the importance of each security
concept.
Discuss and Collaborate: Talk with classmates to explore different perspectives on securing
operating systems.