OS Security Notes
OS Security Notes
1. The operating system protects applications and hardware from attacks like unauthorized access,
code tampering, and fake software, even on personal devices.
2. Mandatory security policies are strict rules set by system administrators, not users, to control
access, authentication, and encryption.
3. Access rules and authentication methods help the OS decide who can use which resources and
how they prove their identity.
4. Security-related parts of the OS must be protected from being changed or bypassed to maintain
system security.
5. Special programs that handle security should have only the minimum permissions they need to
reduce risk.
6. Letting users control security settings can lead to mistakes or malware attacks, making mandatory
policies a safer option.
7. Most operating systems do not support different levels of security and only allow full access or no
access at all, which is dangerous.
8. Users need a secure way to interact with trusted software so that fake programs cannot trick or
impersonate them.
9. Even systems like Java that try to isolate apps can still be attacked, as the Java Virtual Machine
itself can be modified.
10. Operating systems are large and complex, and if one app is compromised, the whole system
can be affected. They also don't give strong ways for users and apps to verify each other.
Shared images, such as virtual machine or container images, can contain hidden malicious code,
outdated software with known vulnerabilities, or even sensitive data like passwords and access
tokens left behind by mistake. If such an image is shared or deployed across systems, it can act as
a doorway for attackers to compromise multiple devices or services. There's also a risk that a
shared image may appear trustworthy but perform harmful actions once executed, leading to system
breaches.