Operating System Security
Operating System Security
Abstract— Operating systems (OS) security is a very be bypassed. The OS should confine an application to a unique
important aspect of the protection of computer systems and their security domain.
data’s integrity, confidentiality and availability. Consequently, this
Applications with special privileges that perform security-
research manuscript seeks to provide a comprehensive analysis of
related functions are called trusted applications. Such applications
OS security in order to enhance understanding, establish challenges
should only be allowed the lowest level of privileges required to
and understand the best way forward. The research method proc-
perform their functions. For example, type enforcement is a
ess involves major areas of studies through the literature review,
mandatory security mechanism that can be used to restrict a trusted
data collection, case studies analysis, experimental and
application to the lowest level of privileges.
comparative evaluations and qualitative analyses. From the theatre
of experimentalism, various theoretical underpinnings are applied
in studying on the historical backgrounds and contemporary frames
of work on OS security with the most emphasized questions. Using
real-life data, the data acquisition process incorporates information
gathered through report surveys, security bulletins, and case-study
research as well as interviews with experts. The application of
security policies is demonstrated in the contextual studies when
case studies are presented; on the other hand, the efficiency of the
security measures is examined in the experimental evaluation of
the security controls. Qualitative comparisons with competitors and
industry segments illustrate what is occurring in OS security and
give insight into its vulnerabilities and future development. The
analysis and integration of results provide practical implications for
improving OS security, recommendations on policy, and Fig. 1
recommendations for future research. This research enriches the
knowledge about OS security and also assists in the development Enforcing mandatory security through mechanisms left to the
of the right measures to prevent future contingencies and risks in discretion of users could lead to a breach of security due not only
computer systems. [1][2]. to malicious intent but also carelessness or lack of understanding.
Discretionary mechanisms place the burden of security
I. INTRODUCTION on individual users. Moreover, an application may change a
An operating system (OS) allows multiple applications to share the carefully defined discretionary policy without the consent of the
hardware resources of a physical system, subject to a set of user, whereas a mandatory policy can only be changed by a system
policies. A critical function of an OS is to protect applications administrator.
against a wide range of malicious attacks such as unauthorized
Unfortunately, commercial operating systems do not
access to privileged information, tempering with executable code,
support multilayered security; such systems only distinguish
and spoofing. Such attacks can now target even single-user systems
between a completely privileged security domain and a completely
such as personal computers, tablets, or smartphones. Data brought
unprivileged one. Some operating systems, such as Windows NT,
into the system may contain malicious code; this could occur via a
allow a program to inherit all the privileges of the program
Java applet, or data imported by a browser from a malicious Web
invoking it, regardless of the level of trust in that program.
site [1].
The existence of trusted paths, mechanisms supporting user
The mandatory security of an OS is considered to be “any
interactions with trusted software, is critical to system security. If
security policy where the definition of the policy logic and the
such mechanisms do not exist, malicious software can impersonate
assignment of security attributes is tightly controlled by a system
trusted software. Some systems provide trust paths for a few
security-policy administrator” [209].Access
functions such as login authentication and password changing and
control, authentication usage, and cryptographic usage policies are
allow servers to authenticate their clients [2].
all elements of mandatory OS security. The first policy specifies
how the OS controls the access to different system objects, the The solution discussed in [209] is to decompose a complex
second defines the authentication mechanisms the OS uses to mechanism into several components with well-defined roles. For
authenticate a principal, and the last specifies the cryptographic example, the access control mechanism for the application space
mechanisms used to protect the data. A necessary but not sufficient could consist of enforcer and decider components. To access a
condition for security is that the subsystems tasked with protected object, the enforcer will gather the required information
performing security-related functions are temper-proof and cannot about the agent attempting the access and will pass this information
to the decider, together with the information about the object and
Fig. 3
III. METHOLOGY
Operating System (OS) security methodology involves a
structured approach to protecting the integrity, confidentiality, and
availability of an OS and its resources. Key components include:
A. Access Control:
Implementing strict user authentication and authorization
mechanisms ensures that only authorized users can access system
resources. This includes using passwords, biometric data, and role-
based access controls [3].
Fig. 6
Establishing clear security policies helps define acceptable use, Establishing a backup strategy is also essential prior to
data protection standards, and incident response strategies. Policies implementing such a security measure. This ensures that even if
guide users in maintaining security and compliance [7]. data is removed from the original system, it is not permanently lost
and can be restored if needed. The backup system should be secure
C. Regular Updates and Patch Management: and regularly updated to reflect the latest data.
Keeping the OS and applications up-to-date with the latest Finally, legal and privacy considerations must be addressed
security patches mitigates vulnerabilities that can be exploited by when designing and implementing this system. Depending on the
attackers [8]. jurisdiction, there may be regulations governing data breach
responses and the protection of personal information that must be
D. Intrusion Detection and Prevention Systems (IDPS): followed. It is advisable to consult with legal experts and
Deploying IDPS can monitor system activities for suspicious cybersecurity professionals to ensure compliance and to create a
behaviour and respond to potential threats in real-time [9]. system that effectively safeguards against unauthorized access while
respecting privacy rights and regulations. Implementing such a
E. Encryption: system requires meticulous planning, a comprehensive
Utilizing encryption for data at rest and in transit protects understanding of potential risks, and a commitment to preserving
the security and privacy of the involved data.
sensitive information from unauthorized access.
F. Auditing and Monitoring: V. WHAT ARE WE PROTECTING?
Regularly reviewing logs and system activities helps identify We aren’t likely to achieve good protection unless we have a fairly
anomalies and potential security breaches. comprehensive view of what we’re trying to protect when we say
our operating system should be secure. Fortunately, that question is
G. User Education and Training: easy to answer for an operating system, at least at the high level:
Educating users about security best practices and potential everything. That answer isn’t very comforting, but it is best to have
threats is crucial in fostering a security-aware culture. a realistic understanding of the broad implications of operating
system security [12]. A typical commodity operating system has
IV. EASE OF USE complete control of all (or almost all) hardware on the machine and
Implementing a security measure that automatically deletes is able to do literally anything the hardware permits. That means it
data from a system upon unauthorized access attempts and sends it can control the processor, read and write all registers, examine any
main memory location, and perform any operation one of its
peripherals supports. As a result, among the things the OS can do
are: