Security-in-Operating-Systems LMS
Security-in-Operating-Systems LMS
Republic of Uzbekistan
Tashkent University of Information Technologies named after Muhammad al-
Khwarizmi
Separation of Privilege
Access requires several conditions, enhancing system safety.
Memory Protection
Techniques
ASLR DEP Stack
Canaries
Randomizes Marks memory
memory as non- Detects buffer
locations to executable to overflow
prevent block malicious attempts with
predictability in code execution. sentinel values.
attacks.
Memory
Isolation
Keeps processes
isolated in
separate address
spaces for safety.
Virtualization and
Sandboxing
Hypervisors
Create fully isolated virtual machines to enhance security.
Containers
Lightweight virtualization for application-level isolation and efficiency.
Sandboxes
Restrict application access to system resources preventing damage.
Biometric
Multi-Factor Authentication
Password Authentication (MFA)
Uses fingerprints or facial
User Authentication Authentication
scans for unique user
Verifies identity before Common method but Adds security layers like verification.
granting system access. vulnerable to guessing codes or devices for
and hacking. strong protection.
Real-World Security
Breaches
1 WannaCry (2017)
Ransomware exploiting Windows SMB vulnerability
infected hundreds of thousands.
3 iOS Exploits
Jailbreaking techniques exploited security gaps in Apple
devices.
.
Staying Secure in a Complex World