Osy Report
Osy Report
3. Proposed Methodology:
4. Action Plan:
Name of
Planned
Sr. No. Details of activity Plan start date responsible
date
members
All group
1. Topic selection 24/07/2024 31/07/2024
members
All group
2. Discussion about topic 31/07/2024 07/08/2024
members
All group
3. Collection of information 07/08/2024 14/08/2024
members
All group
8. Presentation 09/10/2024 16/10/2024
members
5. Resources Required:
2. Software Google -
Operating System Concepts
3. Books 1
-Silberschatz, Galvin
https://en.wikipedia.org/wiki/Co
4. Reference Links -
mmand-line_interface
of operating System.
1. Rationale:
The security of an operating system (OS) is a critical aspect of any computer system, as
it provides the foundation for all applications and services. The OS is responsible for managing
system resources, controlling access to data and systems, and providing a platform for running
applications. As such, the security of the OS is essential to protecting against a wide range of
threats, including malware, unauthorized access, and data breaches. Therefore, it is essential to
implement robust security mechanisms to protect the OS, its components, and the data it
manages. This report provides an in-depth analysis of the security mechanisms employed by
modern operating systems to ensure the confidentiality, integrity, and availability of system
resources
4. Theory:
The history of security mechanisms in operating systems (OS) has evolved significantly
since the inception of computing. Here’s an overview of key developments:
Multics (1965): One of the first operating systems to incorporate security features. It
introduced concepts like user authentication, access control lists, and hierarchical
file permissions.
Bell-LaPadula Model (1973): Developed for the Multics system, this model
focused on maintaining confidentiality through mandatory access controls.
Zero Trust Architecture: Emphasizing "never trust, always verify," this model has
gained traction in OS security frameworks.
Continued Focus on Privacy: With regulations like GDPR, OS designs now
increasingly incorporate privacy as a core feature.
a. Integrity: Users with insufficient privileges should not alter the system’s vital files and resources,
and unauthorized users should not be permitted to access the system’s objects.
b. Secrecy: Only authorized users must be able to access the objects of the system. Not everyone
should have access to the system files
c. Availability: No single user or process should be able to eat up all of the system resources;
instead, all authorized users must have access to them. A situation like this could lead to service
denial. Malware in this instance may limit system resources and prohibit authorized processes
from using them.
b. Network Intrusion: - A system called an intrusion detection system (IDS) observes network
traffic for malicious transactions and sends immediate alerts when it is observed. It is software
that checks a network or system for malicious activities or policy violations. Each illegal
activity or violation is often recorded either centrally using a SIEM system or notified to an
administration.
c. Buffer Overflow Technique: - The buffer overflow technique can be employed to force a
server program to execute an intruder-supplied code to breach the host computer system’s
security. It has been used to a devastating effect in mail servers and other Web servers. The
basic idea in this technique is simple. Most systems contain a fundamental vulnerability—some
programs do not validate the lengths of inputs they receive from users or other programs.
2. Encryption: Data Encryption: Protects data at rest (stored data) and in transit (data being
transmitted) using algorithms (e.g., AES, RSA). File System Encryption: Encrypts files on a
disk to prevent unauthorized access
3. Access Control: User Roles and Permissions: Assigns different levels of access based on
user roles (e.g., admin vs. standard user).
Access Control Lists (ACLs): Specify which users or groups have permissions to access
specific resources.
5. Malware Protection
Antivirus Software: Scans for and removes malicious software.
Sandboxing: Runs applications in isolated environments to prevent potential harm to the
system.
6. Patch Management
Software Updates: Regularly applies patches and updates to fix vulnerabilities in the OS and
applications
7. Kernel Security
Privilege Separation: Limits the access rights of various processes to reduce the risk of
system compromise.
Secure Boot: Ensures that the OS loads only trusted software during startup.
8. Network Security
Firewalls: Control incoming and outgoing network traffic based on predetermined
security rules.
Virtual Private Networks (VPNs): Secure remote access to the network
• Implementation: -
1. Authentication and authorization mechanisms to control access to the system and its
resources :- The OS provides a range of authentication and authorization mechanisms,
including username and password, smart cards, and biometric authentication.
- plement Strong Passwords: Implement strong passwords, including password length,
complexity, and expiration.
- Implement Authentication Mechanisms: Implement authentication mechanisms, such
as username and password, smart cards, and biometric authentication
2. Access control mechanisms to regulate the actions that can be performed by users
and applications :- The OS provides a range of access control mechanisms, including
discretionary access control (DAC), mandatory access control (MAC), and role-based
access control (RBAC).
4. Auditing and logging mechanisms to monitor and track system activity :- The OS
provides a range of auditing and logging mechanisms, including system logs, application
logs, and security logs.
5. Patch management and software update mechanisms to ensure the OS and its
components are up-to-date and secure :- : A patch management and software update
process is essential for ensuring the operating system is up-to-date and secure. The
following steps should be taken:
I. Hardware Factors
- Processor Architecture: The processor architecture can affect the security of the OS, as
different architectures may have different security features and vulnerabilities.
- Memory: The amount and type of memory can affect the security of the OS, as insufficient
memory can lead to security vulnerabilities.
- Operating System Design: The design of the OS can affect its security, as a poorly
designed OS can have security vulnerabilities.
- Programming Languages: The programming languages used to develop the OS can affect
its security, as some languages may be more secure than others.
- Third-Party Software: The security of third-party software can affect the overall security of
the OS, as vulnerable software can compromise the OS.
- Network Architecture: The network architecture can affect the security of the OS, as a
poorly designed network can have security vulnerabilities.
- Network Protocols: The security of network protocols, such as TCP/IP, can affect the
overall security of the OS.
- Firewalls and Intrusion Detection Systems: The security of firewalls and intrusion
detection systems can affect the overall security of the OS.
- User Behavior: The behavior of users can affect the security of the OS, as users may
intentionally or unintentionally compromise the OS.
- Administrator Behavior: The behavior of administrators can affect the security of the OS,
as administrators may intentionally or unintentionally compromise the OS.
- Training and Awareness: The level of training and awareness of users and administrators
can affect the security of the OS.
V. Environmental Factors
- Physical Environment: The physical environment can affect the security of the OS, as a
poorly secured physical environment can compromise the OS.
- Power and Cooling: The reliability of power and cooling systems can affect the
security of the OS, as a failure of these systems can compromise the OS.
- Natural Disasters: Natural disasters, such as earthquakes and floods, can affect the
security of the OS, as these events can compromise the OS.
- Complexity: The complexity of the OS can affect its security, as a more complex OS
may have more security vulnerabilities.
- Interoperability: The interoperability of the OS with other systems can affect its
security, as a lack of interoperability can lead to security vulnerabilities.
- Scalability: The scalability of the OS can affect its security, as a scalable OS may be
more secure than a non-scalable OS.
• RECOMMENDATIONS
The security of the operating system is critical to protecting against a wide range of
threats. The OS provides a range of security features and mechanisms to achieve this goal.
However, the OS is also vulnerable to a range of security threats and vulnerabilities.
Implementing the recommendations outlined in this report can help to improve the security of
the operating system.
5. Actual Methodology:
Sr. Name of
Specifications Quantity
No. resource/material
2. Software Google -
7. Skill developed:
1. Skill Development: Working on this project helps develop critical technical skills
such as command-line proficiency, scripting, and system management.
4. Practical Application: The project can involve hands-on tasks such as configuring a
command-line based OS.
5. Foundation for Further Projects: This micro project can serve as a foundation for
more advanced projects or research.
9. References:
1. Books:
Operating System Concepts –Silberschatz Galvin
Operating System-Godbole Achyut S.
2. Links:
https://en.wikipedia.org/wiki/Security-OS
https://chatgpt.com/