Introduction

Every software design and computer system must handle every security risks along with implementing essential measures for enforcing policies of security. At the same time, it happens to be crucial for striking a balance due to the increase in the costs by the strong measures of security along with providing limitation in the utility, usability as well as smooth operation of the system.

Related works

A secure architecture design based on code minimization and application isolation, by Aditi Gupta, Michael S. Kirkpatrick and Elisa Bertino

With attacks evolving at a faster rate, usage of the software patches to fix the software bugs cannot be considered enough as there are usual considerable delays in the application to vulnerable systems and the attackers might seem to be finding other vulnerabilities for exploitation. A secure design in the architecture, which helps in providing the robust protection against the malware have to be guided by the principles with strong security. The paper proposed a design of system on the basis of specific security principles, which aim at the achievement of isolation along with the reduction of the attack surface. The design is considered to be leveraged between the procedure of application so that the infected and the malicious application does not have the ability impacting other segments of the system.

Get Assignment Help from Industry Expert Writers (1)

Rosemary: A Robust, Secure, and High-Performance Network Operating System, by Shin et.al.

Balance of the goals that are seemingly irreconcilable in terms of robustness, both performance as well as security involve in the presentation of an initial challenge in the contemporary design of a network controller. This can be viewed as an opportunity for advancement in the research of network security along with realizing the vision by designing ROSEMARY, a new NOS. ROSEMARY seems to be adopting a timely and practical approach for addressing the specific challenge with the help of careful design of a specific NOS comprised of three integral characteristics.

Can We Make Operating Systems Reliable and Secure? by Tanenbaum et.al.

Existing operating systems are in possession of two features, which seem to be making them both insecure as well as unreliable. They are massive long with being poor fault isolation. The Linux kernel is considered to be around 2.5 million of code lines, and the Windows XP kernel is considered to be more than twice as huge.  A single study in terms of software reliability seemed to have shown that the code is comprised between 6 to 16 bugs every 1000 lines of the code that are executable.

Secure Operating Systems, by Christopher A. Wood

The development of operating system is considered to be diversified task, typically drawing from several applications of software engineering, computer engineering, information technology and computer engineering. The complexity of the systems that are mostly usable is considered to be significantly higher than the projects of traditional software. The specific fact is considered to be presenting a problem with the implementation of the security features as well as the policies for the current systems. Usually, it is already considered to be quite late in the process of development for making substantial headways, along with achieving features that are newly added shall likely not be better enough for deterring the determined attackers.

Proposed Solution/Method

Get Assignment Help from Industry Expert Writers (1)

The techniques mostly in common used for protecting the operating system seems to be inclusive of the usage of the antivirus software along with other measures of endpoint protection, regular updates for the OS patch, a firewall in monitor network traffic, along with enforcing access to the security through user controls as well as least privileges. The techniques might be inclusive of performing regular updates on OS patch, installation of updated antivirus software and engines, scrutiny of every ongoing and incoming network traffic with the help of a firewall, and creation of a secure account with needed privileges only.

Conclusion

The operating system security is considered to be the procedure to make sure there is integrity of the operating system, availability as well as confidentiality. The operating system security is referred to the specified phases along with measures used for protecting the operating system from the viruses, threats, malware, worms, as well as intrusions of a remote hacker.

Know more about UniqueSubmission’s other writing services:

Assignment Writing Help

Essay Writing Help

Dissertation Writing Help

Case Studies Writing Help

MYOB Perdisco Assignment Help

Presentation Assignment Help

Proofreading & Editing Help

 

Leave a Comment