reviewer for operating systems security (week3)
Software platforms made to govern and control a personal computer's (PC) or workstation's fundamental activities.
DESKTOP OS
Desktop operating systems provide a _________, nowadays are mostly graphical interfaces (GUI), that includes a desktop environment, icons, windows, menus, controls, and a pointer (usually a mouse or touchpad).
CHARACTERISTICS OF OS
User Interface
Users can create, organize, and manage files and folders on their computer's storage devices (e.g., hard drives, SSDs) using the file explorer or file manager provided by the operating system
CHARACTERISTICS OF OS
File Management
The OS manages computer hardware components, such as the central processing unit (CPU), memory (RAM), storage devices, input/output devices (keyboard, mouse, display), and peripherals (printers, scanners).
CHARACTERISTICS OF OS
Hardware Management
Desktop operating systems enable _________, allowing users to run multiple applications concurrently. They allocate system resources efficiently to ensure smooth operation
CHARACTERISTICS OF OS
Multitasking
Operating systems include device drivers that facilitate communication between hardware devices (e.g., graphics card, sound card, network adapter) and the software running on the computer.
CHARACTERISTICS OF OS
Device Drivers
OSs implement _________ measures to protect the computer from threats, including user authentication, access control, firewall settings, and antivirus integration.
CHARACTERISTICS OF OS
Security
Desktop OSs support network connectivity, enabling users to access the internet, connect to local networks, and share resources with other devices. Network protocols and settings are managed by the OS.
CHARACTERISTICS OF OS
Networking
They provide compatibility layers and application programming interfaces (APIs) that allow software developers to create applications that run on the OS.
CHARACTERISTICS OF OS
Software Compatibility
Users create and manage accounts with unique profiles and settings. Access to system resources and files is controlled through user authentication and permissions.
CHARACTERISTICS OF OS
User Account Management
Operating systems implement _________ mechanisms that define which users or processes can access specific files, directories, or system resources.
DESKTOP COMPUTER SECURITY
Access Control
OSs assign file permissions to regulate who can read, write, or execute files and directories.
DESKTOP COMPUTER SECURITY
File Permissions.
___________ filter network traffic, allowing users to control which applications and services can communicate over the network.
DESKTOP COMPUTER SECURITY
Firewalls
Operating systems often support ____________ software, which scans for and removes malicious software, such as viruses, Trojans, and spyware
DESKTOP COMPUTER SECURITY
Antivirus and Anti-Malware Integration
Desktop operating systems release regular _____________ to address known vulnerabilities.
DESKTOP COMPUTER SECURITY
Security Updates and Patches
__________ is a feature that ensures that only trusted and signed operating system components and drivers are loaded during system startup.
DESKTOP COMPUTER SECURITY
Secure Boot
DESKTOP COMPUTER SECURITY
Encryption
OSs provide________ features to secure data at rest and in transit
DESKTOP COMPUTER SECURITY
Encryption
Operating systems generate logs and maintain audit trails of system activities.
DESKTOP COMPUTER SECURITY
Audit Trails and Logging
OSs allow administrators to enforce strong password policies, password expiration, and account lockout rules.
DESKTOP COMPUTER SECURITY
User Account Policies
Some operating systems use __________ techniques to isolate applications from one another and from system resources
DESKTOP COMPUTER SECURITY
Application Sandboxing
OSs often rely on __________ to verify the authenticity and integrity of software updates and applications
DESKTOP COMPUTER SECURITY
Digital Signatures
often referred to as user-level or user-space, is one of the privilege levels in the security architecture of an operating system. A restricted mode where most applications and processes run
User mode
They are not allowed to execute sensitive or privileged operations directly, such as accessing hardware resources or modifying the operating system kernel.
FUNCTIONS OF USER MODE
Restricted Privileges
Each user mode process runs in its own isolated environment, ensuring that one process cannot interfere with or directly access the memory or resources of another process.
FUNCTIONS OF USER MODE
Isolation
User mode processes can interact with the kernel and request access to system resources through system calls or API functions.
FUNCTIONS OF USER MODE
System Calls
The operating system manages and allocates system resources, such as memory, CPU time, and I/O devices, on behalf of user mode processes
FUNCTIONS OF USER MODE
Resource Management
Errors or exceptions that occur in user mode processes typically do not disrupt the entire system.
FUNCTIONS OF USER MODE
Error Handling
User mode processes execute within the context of a specific user account
FUNCTIONS OF USER MODE
User Account Context
Some operating systems or security tools implement _________ techniques to further isolate and control the behavior of user mode applications.
FUNCTIONS OF USER MODE
Application Sandbox
It operates at the highest privilege level and is responsible for managing and controlling the core functions of the operating system and hardware resources
Kernel Mode
Kernel mode operates with _______, allowing it to access and control all hardware resources and execute sensitive and privileged instructions.
Functions of Kernel Mode
Highest Privilege
The kernel is responsible for managing and allocating system resources, including CPU time, memory, input/output devices, and peripheral hardware
Functions of Kernel Mode
System Resource Management
User mode processes interact with the kernel through system calls or API functions to request access to hardware resources and perform privileged operations
Functions of Kernel Mode
System Calls
Enable communication between the operating system and hardware devices, typically run in kernel mode.
Functions of Kernel Mode
Device Drivers
Kernel mode enforces security policies and access control mechanisms to protect system resources and ensure data integrity.
Functions of Kernel Mode
Security Enforcement
Kernel mode is responsible for handling critical system errors and exceptions.
Functions of Kernel Mode
Error Handling
ernel mode processes are isolated from user mode processes to prevent unauthorized access or interference. ________________ mechanisms, such as virtual memory and isolation. hardware memory management units (MMUs), help enforce this
Functions of Kernel Mode
Memory Protection
The_________, including the scheduler, file system, memory manager, and process manager, operate in kernel mode
Functions of Kernel Mode
Operating System Core
Kernel mode can execute privileged CPU instructions that user mode cannot
Functions of Kernel Mode
Privileged Instructions
Ensuring the integrity of the kernel is paramount. Any compromise of the kernel could lead to security breaches, system instability, or unauthorized access to sensitive data
Functions of Kernel Mode
System Integrity