0% found this document useful (0 votes)
3 views21 pages

Security-in-Operating-Systems LMS

The document discusses security in operating systems, emphasizing the importance of the CIA Triad: Confidentiality, Integrity, and Availability. It outlines foundational security principles, memory protection techniques, and methods for authentication and authorization, while also highlighting real-world security breaches. The document concludes with a note on the necessity of continuous security processes and anticipatory measures for future trends in OS security.

Uploaded by

Qobulov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views21 pages

Security-in-Operating-Systems LMS

The document discusses security in operating systems, emphasizing the importance of the CIA Triad: Confidentiality, Integrity, and Availability. It outlines foundational security principles, memory protection techniques, and methods for authentication and authorization, while also highlighting real-world security breaches. The document concludes with a note on the necessity of continuous security processes and anticipatory measures for future trends in OS security.

Uploaded by

Qobulov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Ministry of Development of Information Technologies and Communications of the

Republic of Uzbekistan
Tashkent University of Information Technologies named after Muhammad al-
Khwarizmi

Theme : Security in Operating Systems

Group: OPS401Performed by: ​

Toirov Jahongir / Rixsitillayev Azizbek / Tohirov Ozodbek ​

Checked by: Tahir Rabia


Security in Operating Systems:

Operating system security protects computing


environments from today's varied threats. It evolved
from simple controls to complex systems. The core
principles—Confidentiality, Integrity, and
Availability—form the CIA Triad, ensuring secure
and reliable access to resources.
.
.
.
.
.
.
.
.
.
Foundational Security
Principles
Principle of Least Defense in Depth
Privilege
Multiple security layers
Users get only the minimum work together to prevent
access needed to perform breaches.
tasks.

Separation of Privilege
Access requires several conditions, enhancing system safety.
Memory Protection
Techniques
ASLR DEP Stack
Canaries
Randomizes Marks memory
memory as non- Detects buffer
locations to executable to overflow
prevent block malicious attempts with
predictability in code execution. sentinel values.
attacks.

Memory
Isolation
Keeps processes
isolated in
separate address
spaces for safety.
Virtualization and
Sandboxing
Hypervisors
Create fully isolated virtual machines to enhance security.

Containers
Lightweight virtualization for application-level isolation and efficiency.

Sandboxes
Restrict application access to system resources preventing damage.

Example: Chrome Sandbox


Google Chrome isolates tabs to protect against exploits targeting
the browser.
Authentication and Authorization

Biometric
Multi-Factor Authentication
Password Authentication (MFA)
Uses fingerprints or facial
User Authentication Authentication
scans for unique user
Verifies identity before Common method but Adds security layers like verification.
granting system access. vulnerable to guessing codes or devices for
and hacking. strong protection.
Real-World Security
Breaches
1 WannaCry (2017)
Ransomware exploiting Windows SMB vulnerability
infected hundreds of thousands.

2 Meltdown & Spectre (2018)


CPU flaws affecting almost all processors, allowing data leaks.

3 iOS Exploits
Jailbreaking techniques exploited security gaps in Apple
devices.
.
Staying Secure in a Complex World

Continuous Process Proactive Measures Future Trends


Security requires constant Anticipate threats rather than AI threat detection and zero-
updates, reviews, and just reacting to incidents. trust models will shape OS
improvements. security.

You might also like