Operating System SecurityWA
Operating System SecurityWA
Capella University
Abstract
The lifeline of the computer system is the operating system which is the heartbeat that keeps it
running. these Operating Systems support the functions of computing user interaction, libraries,
to remake it. That is why the Operating System development life cycle requires effective and
best practices of the final product that can withstand the test of time.
This paper describes the major security concepts in a modern operating system. this
paper, we will discuss the basic security issues in OS design and implementation. The paper will
look at the design issues and security concepts in Operating System by making a
recommendation and finally” the role of the modern OS in creating a network system design”
Table of Content
Cover Page,
Abstract.
Table of Content.
Introduction/ Body
Conclusion
References
OPERATING SYSTEM SECURITY 4
Introduction
Whiles the goals of Operating System which the foundation system by which a hardware
or computer devices to be controllable by the inputs of instructions and operational in given the
desired result of the outcome. By the Operating System, it administers all the applications and
programs on the hardware or computer. Since it is the heartbeat of hardware or computer all
security protections and services run in connections with its. That is why the Operating System
should be able to work well with other software, without any system vulnerabilities throughout
the development lifecycle to when the end user purchase and installed on the hardware or
computer. Security of the Operating System runs from the beginning of the development of OS
components through the secure coding and OS product testing, OS libraries, User Management,
Operating System security happens when their OS data is secure, an attacker cannot
inject manipulated codes into the OS operations when running on hardware or computer,
connections with other applications its threats should not come from human error, malicious
applications and the hardware or computer system weakness. The way an Operating system
ensure security of all its data through its authentication of validating the end user accessing
policy to ensure the right user is authorized to access what functions or program on the hardware
or computer the ability to limit sharing, isolation services, access control services, confine
service, the also login access management, the User attributes these functions allow the
authentication and permission of legitimate users to access what, also the OS allocates unique
attributes to each user to identify the user each time by the login. There is all OS security from
the backup and restoration which is function from the OS which permit the user to be able to
OPERATING SYSTEM SECURITY 5
restore and backup of all information either by files or the hardware or computer system image
backup from data files, system files, folders and subfolders, application files, programs files and
user access management files. Another security of modern OS the ability to limit administrative
access control to the hardware system and data whiles continuing their duties on the computer.
There is the security service offered by the modern OS the control of the flow of information
Modern Operating System by default makes no access function available for all resources
of the hardware in the designing of the OS development life cycle. The basic security risk found
in the OS is the memory management of OS assurance so that it can fend off attack that leads to
low performance which is in the design of the operating system if coding of the application
development life is properly vetted an attacker can inject a malicious code into the OS by the
reverse engineering of Operating System and its libraries of the OS (Krishna, 2003, para 16-19) .
The protection services that offers the OS ability to share resources with other different users
these services can give privileges to users through isolation, share all access or share nothing at
all, ability, access or partial use. Since the kernel administers all the properties security and
admission, permission and monitoring, restricting the flow of information which can be shared.
The memory allocation for the OS should be separated and secured only user-orientation access
should be permitted, only permitting user by the required system and side by side obligatory to
administrators providing design principles for open source OS like Linux, Apache that can use
for the organization technical security needs where they can organization developers create OS
patch up and security controls for the OS weakness and OS security control defense, also allow
OPERATING SYSTEM SECURITY 6
for rollback OS on hardware or instead of reinstallation of OS. Also, following the DoD
framework for OS trusted the system. Some of these open source OS gives organization
administrator the freedom to do all that and they are able to share their OS security flaws with
Operating System has played the role of help administrators to design and implement
secure network design. If we have to design secure network design without taking into
recognition the secure network design will support multiple users and computer network system
devices and technologies that will require infrastructure access to various types of generated data
or information, subsystem networks. The kind of OS use for secure network design will require
administrator that can support it in providing security control management, access control
management, network protocol management, user access control management, and information
security policy.
OPERATING SYSTEM SECURITY 7
References
Santana, M. (2009). Chapter 6, Eliminating the Security weakness of Linux and Unix Operating
Capella University, 2019, Courseroom, unit 2, Operating System Security, Date retrieved
01/16/2019,https://courserooma.capella.edu/webapps/blackboard/content/listContent.jsp?
course_id=_162482_1&content_id=_7268977_1&mode=reset
https://www.computerworld.com/article/2571939/security0/steps-to-a-secure-operating-
system.html