OS Protection and Security
OS Protection and Security
Security
• Computer security, often referred to as cybersecurity, is the
practice of protecting computer systems, networks, and data
from unauthorized access, attacks, or damage. Below are the
key concepts that form the foundation of computer security:
The core objectives of computer security are often summarized by the CIA
triad:
• Confidentiality: Ensuring that sensitive information is accessible only to
those who are authorized.
• Techniques include encryption, access controls, and secure authentication.
• Integrity: Protecting data from unauthorized modification or corruption.
• Methods like checksums, hash functions, and digital signatures help verify integrity.
• Availability: Ensuring that systems and data are accessible to authorized
users when needed.
• This involves mitigating risks like denial-of-service (DoS) attacks and ensuring
redundancy and backups.
• Authentication: Verifying the identity of a user or system
e.g., using passwords, biometrics, or tokens).
• Authorization: Granting access to resources based on permissions.
• Accountability: Ensuring that actions within a system can be traced to
an individual or process (via logging and auditing).
Threats and Vulnerabilities
• Threats: Potential causes of harm to systems or data, such as
malware, phishing attacks, or insider threats.
• Vulnerabilities: Weaknesses in a system that can be exploited by
threats, like software bugs, misconfigurations, or unpatched systems
Types of Security Controls
• Preventive Controls: Designed to stop threats before they occur (e.g.,
firewalls, antivirus software).
• Detective Controls: Identify and alert on ongoing or past security
events (e.g., intrusion detection systems).
• Corrective Controls: Restore systems to normal operation after a
security incident (e.g., backups and disaster recovery).
Security Domains
• Physical Security: Protecting hardware and facilities from physical
threats like theft or natural disasters.
• Network Security: Securing data during transmission, often through
firewalls, VPNs, and intrusion detection systems.
• Application Security: Ensuring software is free of vulnerabilities
through secure development practices and regular updates.
• Endpoint Security: Protecting individual devices like laptops, phones,
and servers from malware and unauthorized access.
Key Security Principles
• Least Privilege: Users and systems should only have the minimum
permissions necessary to perform their functions.
• Defense in Depth: Implementing multiple layers of security to reduce
risk.
• Security by Design: Building systems with security considerations
from the outset.
• Zero Trust: Assumes no user or device is inherently trusted, even
within the network perimeter
Cryptography plays a central role in computer security, involving
techniques like:
• Encryption: Securing data in transit or storage so unauthorized parties
cannot read it.
• Digital Signatures: Verifying authenticity and integrity.
• Public Key Infrastructure (PKI): Managing digital certificates and
public/private key pairs.
Security Policies and Compliance
• Policies: Set of rules and practices for securing data and systems (e.g.,
password policies, incident response plans).
• Compliance: Adhering to laws and standards like GDPR, HIPAA, or PCI
DSS
Risk Management
• Understanding, assessing, and mitigating risks are vital. The process
includes:
• Identifying risks.
• Analyzing their impact and likelihood.
• Implementing measures to reduce risks.
Incident Response
• A structured approach to handling security breaches, often involving:
• Detection.
• Containment.
• Eradication.
• Recovery.
• Post-incident review.
Basic Requirements for Trusted Operating Systems