0% found this document useful (0 votes)
4 views2 pages

OS Security Notes

Operating system security involves protecting applications and hardware from unauthorized access and attacks through strict mandatory policies set by administrators. Shared images pose risks by potentially containing malicious code or sensitive data, while poor OS management can lead to vulnerabilities through weak access controls and misconfigurations. Overall, the complexity of operating systems means that a single compromised application can jeopardize the entire system's security.

Uploaded by

Rana Manal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

OS Security Notes

Operating system security involves protecting applications and hardware from unauthorized access and attacks through strict mandatory policies set by administrators. Shared images pose risks by potentially containing malicious code or sensitive data, while poor OS management can lead to vulnerabilities through weak access controls and misconfigurations. Overall, the complexity of operating systems means that a single compromised application can jeopardize the entire system's security.

Uploaded by

Rana Manal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Operating System Security Notes

1. Summary of 11.7 Operating System Security (10 Points)

1. The operating system protects applications and hardware from attacks like unauthorized access,
code tampering, and fake software, even on personal devices.
2. Mandatory security policies are strict rules set by system administrators, not users, to control
access, authentication, and encryption.
3. Access rules and authentication methods help the OS decide who can use which resources and
how they prove their identity.
4. Security-related parts of the OS must be protected from being changed or bypassed to maintain
system security.
5. Special programs that handle security should have only the minimum permissions they need to
reduce risk.
6. Letting users control security settings can lead to mistakes or malware attacks, making mandatory
policies a safer option.
7. Most operating systems do not support different levels of security and only allow full access or no
access at all, which is dangerous.
8. Users need a secure way to interact with trusted software so that fake programs cannot trick or
impersonate them.
9. Even systems like Java that try to isolate apps can still be attacked, as the Java Virtual Machine
itself can be modified.
10. Operating systems are large and complex, and if one app is compromised, the whole system
can be affected. They also don't give strong ways for users and apps to verify each other.

2. Security Risk Posed by Shared Images

Shared images, such as virtual machine or container images, can contain hidden malicious code,
outdated software with known vulnerabilities, or even sensitive data like passwords and access
tokens left behind by mistake. If such an image is shared or deployed across systems, it can act as
a doorway for attackers to compromise multiple devices or services. There's also a risk that a
shared image may appear trustworthy but perform harmful actions once executed, leading to system
breaches.

3. Security Risk Posed by OS Management


Managing an operating system involves complex tasks like handling user access, installing updates,
and configuring services. If done incorrectly, it can create serious security problems. Weak access
controls may allow unauthorized users to access or change important settings. Poorly managed
updates can leave the OS open to known vulnerabilities. Misconfigured services or open ports may
be exploited by attackers. Also, if the OS does not isolate applications properly, one compromised
app can affect the entire system, putting all data and services at risk.

You might also like