Techniques PDF
Techniques PDF
Operating System
Security And
Techniques
Introduction to Cybersecurity and strategy
LEARNING OBJECTIVES
At the end of this lesson, you should be able to:
Operating System
What is an operating system?
An operating system is a program that acts as an intermediary between the user of a computer
and the computer hardware, providing a platform for eicient and secure execution of
programs.
The primary goal of an operating system is to manage system resources such as memory, CPU,
storage, and peripherals, allocating them to dierent processes, and ensuring fair and eicient
usage.
Introduction to Cybersecurity and strategy
Operating System
Some examples of operating systems are Windows, Linux, UNIX and MacOS.
Operating systems are crucial components of computing devices, providing the foundational
software infrastructure necessary for their operation. When we talk about computers, we often
refer to the operating system when naming a device; for example, a Windows machine or an iOS
device.
Introduction to Cybersecurity and strategy
Operating System
Operating systems play a critical role when it comes to protecting and securing the resources
present in our computer systems.
Additionally, it also functions to provide:
● Abstraction of hardware.
● Controlled hardware access.
● Process Isolation.
When we are looking at the arrangement of a computer system, we first start at the level of the
hardware.
Introduction to Cybersecurity and strategy
Operating System
At the hardware layer, we have the CPU, physical memory, and other I/O devices. Direct use of
hardware is really diicult. Instead of managing the hardware explicitly, we run a "program"
called an operating system that handles the access and management of the low-level
hardware resources. As a mediator between applications and hardware resources, the
operating system unsurprisingly plays an important role in the security of computer systems.
Introduction to Cybersecurity and strategy
Application Security
Once the base operating system is installed and appropriately secured, the required services
and applications can be installed and configured.
Software that provides remote access or service is of particular concern, since an aacker may
exploit this to gain remote access to the system.
Any such software needs to be carefully selected, configured, and updated to the most recent
version available. Any installed application must be patched to the most recent supported
secure version appropriate for the system.
Introduction to Cybersecurity and strategy
Application Security
Application Configuration
● Applications that include default data, scripts, or user
accounts should be reviewed.
● As part of the configuration process, careful
consideration should be given to the access rights
granted to the application.
Encryption Technology
● Encryption is a key enabling technology that may be
used to secure data both in transit and when stored.
● If secure network services are provided, then suitable
public and private keys must be generated.
Introduction to Cybersecurity and strategy
Security Maintenance
Once the system is appropriately built, secured, and deployed, it’s important to understand
that the process of maintaining security is continuous.
The process of security maintenance includes the following additional steps:
● Monitoring and analysing logging information helps detect and investigate security
incidents.
● Performing regular backups ensures that critical data is protected.
● Regularly testing system security to identify and address potential weaknesses in the
system’s defenses.
● Using appropriate software maintenance processes to patch and update all critical
software.
Introduction to Cybersecurity and strategy
Security Maintenance
Logging
● Logging ensures that in the event of a system breach or
failure, administrators identify what happened and
focus their remedy and recovery eorts.
● The key is to ensure you capture the correct data in the
logs, and then appropriately monitor and analyse this
data.
● Logging information can be generated by the system,
network, and applications.
● Logging can generate significant volumes of
information. It is important that suicient space is
allocated for them.
Introduction to Cybersecurity and strategy
Security Maintenance
Data Backup and Archive
● Performing regular backups of data on a system is a
critical control that assists with maintaining the
integrity of the system and user data.
● There are many reasons why data can be lost from a
system, including hardware or software failures, or
accidental or deliberate corruption.
● Backup involves creating duplicates of data to restore
it in case of loss or corruption, while archiving involves
storing copies of data for long-term retention,
typically for months or years.
● Archiving involves storing data for long-term
retention, typically for months or years, to meet legal,
regulatory, or business requirements.
Introduction to Cybersecurity and strategy
Mid-lesson Questions
Question 1:
Describe what operating system hardening entails
in operating system security.
Answer
Patch Management
Ensuring that system and application code is kept up to
date with security patches.
Modern Unix and Linux include tools for automatically
downloading and installing software and security updates
to minimise the time a system is vulnerable to known
vulnerabilities for which patches exist.
Introduction to Cybersecurity and strategy
SUMMARY
In this class, we have studied:
● Operating systems and its function
● Steps for securing operating system
● How to secure applications that sits on operating system
● Techniques for securing Linux/UNIX OS
● Techniques for securing Windows OS
Introduction to Cybersecurity and strategy
Further reading
● Stalling, W. (2015). Computer security principles and practice.
● Whitman, M. E., & Maord, H. J. (2021). Principles of information security. Cengage
learning.
● Bishop, M. (2004). Introduction to computer security. Addison-Wesley Professional.
● Silberschatz, A; Galvin, P. B. & Gagne, G. (2012). Operating System John, N. J. (2015).
Concepts. Hoboken, Wiley & Sons. Silberschatz, G. & Gagne, G. (2014): Operating system
concept.
Introduction to Cybersecurity and strategy
Thank
You