Security in Operating Systems PDF
Document Details
Uploaded by Deleted User
Pepito Pinor Gomez
Tags
Summary
This presentation discusses OS security fundamentals, covering user authentication, access controls, encryption, and malware protection. It also details securing Windows, Linux, and macOS, and explores patch management, including vulnerability identification, deployment, testing, automation, and challenges like compatibility issues and downtime. The document focuses on practical security measures for operating systems.
Full Transcript
Pepito. Pinor. Gomez OS Security Fundamentals User Authentication - ensures that only authorized users can access the system. This includes password protection, biometrics, or multi-factor authentication (MFA). Access Control - Limits what users and programs can do on a system. Techniques include...
Pepito. Pinor. Gomez OS Security Fundamentals User Authentication - ensures that only authorized users can access the system. This includes password protection, biometrics, or multi-factor authentication (MFA). Access Control - Limits what users and programs can do on a system. Techniques include Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) to assign specific permissions. Encryption - protects data by converting it into unreadable formats for unauthorized users. OS-level encryption, like BitLocker (Windows) or FileVault (macOS), secures sensitive information both in storage and transit. Auditing and Logging -This involves keeping detailed records (logs) of system events, including access attempts, user activities, and any changes made to the OS. Malware Protection - Anti-malware and antivirus software scan the system for malicious software, such as viruses, trojans, and ransomware, to remove or quarantine threats before they cause damage. Securing Windows Windows Defender - A built-in antivirus program that provides real-time protection against malware, viruses, and other threats BitLocker - Full-disk encryption that protects data from theft or unauthorized access, especially on lost or stolen devices. User Account Control (UAC) - Prevents unauthorized changes to the system by requiring user consent for administrative-level tasks. Windows Firewall - Filters network traffic and blocks malicious access attempts to protect the system from external threats. Active Directory (AD) and Group Policy - In enterprise environments, AD allows centralized user and security management, while Group Policy helps enforce security rules across multiple machines Securing Linux SELinux (Security-Enhanced Linux) - A powerful security feature that enforces strict access controls for system processes, limiting potential damage from vulnerabilities. File Permissions and Ownership - Linux’s permission system ensures that only authorized users or processes can access certain files. Commands like chmod, chown, and umask allow fine-grained control over file access. SSH (Secure Shell) - Provides encrypted remote access to Linux systems, reducing the risk of man-in-the-middle attacks during remote connections. Firewall (iptables/ufw) - Linux firewalls like iptables or ufw enable administrators to create rules to filter network traffic and block malicious connections. Securing macOS FileVault - macOS’s built-in encryption system that provides full-disk encryption to protect data. Gatekeeper - Prevents unauthorized apps from running by allowing only applications downloaded from the App Store or identified developers to run. XProtect - A built-in malware detection tool that scans and blocks known malicious software. System Integrity Protection (SIP) - Limits the actions that the root user can perform on protected parts of the system, reducing the likelihood of critical system modifications by malware. Patch Management Key Steps in Patch Management: Vulnerability Identification - Identifying potential vulnerabilities in the OS through scanning tools or alerts from software vendors. Patch Deployment - Rolling out patches to fix identified vulnerabilities, either through manual updates or automated systems like Windows Update or Linux package managers. Testing and Validation - Testing patches in a non-production environment before deployment to ensure they do not introduce new issues. Automation and Scheduling - Automating the patching process ensures that critical updates are applied without delay. Regular patching schedules help organizations stay current and reduce risk. Challenges of Patch Management: Compatibility Issues - Some patches may cause compatibility problems with existing software or hardware. Downtime - Applying patches may require system restarts or maintenance windows, impacting productivity. Delays - Failure to apply patches quickly increases the risk of cyberattacks that exploit unpatched vulnerabilities. Thank You