More Subjects
Detailed Analysis of Security in in Operating Systems
1st Author
1st author's affiliation1st line of address2nd line of addressTelephone number, incl. country code
1st author's E-mail address
2nd Author
2nd author's affiliation1st line of address2nd line of addressTelephone number, incl. country code
2nd E-mail
3rd Author
3rd author's affiliation1st line of address2nd line of addressTelephone number, incl. country code
3rd E-mail
ABSTRACT
The paper is intended to cover a Detailed analysis of Security in Operating Systems. It will involve explanations of different types of operating systems including bash, time sharing, distributed and network operating systems and cover central criterions which are required to meet including user accounts management, account policies, file systems and security of network services. It will also explain how to avoid threats due to inadequate operating system security, which are based only on user identity information and require to achieve kernel level security. The paper will extensively cover possible security issues using conventional operating systems with details of various security levels, including D, C1, C2, and B2, until A1, which is considered as the most secure level, where most operating systems are secure up to C2 or below. Recent cases study that provide secure operating system controls on kernel level will also be discussed.
Keywords
Security of Operating System; Kernel Level
INTRODUCTION
1.1 Operating System
Operating system is a low-level software that works as an interface to link the computer user and hardware of a computer. It manages all tasks relating to software and hardware like scheduling tasks and managing peripherals. The operating system acts like a ‘manager’ to provide memory, central processing unit and storage to multiple programs running simultaneously.
Figure SEQ Figure \* ARABIC 1-General Operating System ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"sbTnCChy","properties":{"formattedCitation":"[8]","plainCitation":"[8]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/JowGESj9","uris":["http://zotero.org/users/local/YgsdZK9k/items/YQRXKH3U"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/YQRXKH3U"],"itemData":{"id":110,"type":"webpage","title":"Operating Systems","URL":"https://www.cl.cam.ac.uk/teaching/1011/OpSystems/os1a-slides.pdf","author":[{"literal":"Steven Hand"}],"accessed":{"date-parts":[["2019",11,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [8]
1.2 Operating system security
Operating system security (OS Security) is a vital process to ensure the availability, discretion and integrity of an operating system. OS security includes a set of measures which shield the OS from distant hacker attacks, malware invasions, warms, viruses and threats. OS Security is established in multiple ways which include:
LITERATURE REVIEW
The first operating system was introduced in early 1950s. In ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"9vhlKA81","properties":{"formattedCitation":"[2]","plainCitation":"[2]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/hsp11vdX","uris":["http://zotero.org/users/local/YgsdZK9k/items/YQMBYQ65"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/YQMBYQ65"],"itemData":{"id":91,"type":"book","title":"Classic Operating Systems: From Batch Processing to Distributed Systems","publisher":"Springer Science & Business Media","number-of-pages":"597","source":"Google Books","abstract":"An essential reader containing the 25 most important papers in the development of modern operating systems for computer science and software engineering. The papers illustrate the major breakthroughs in operating system technology from the 1950s to the 1990s. The editor provides an overview chapter and puts all development in perspective with chapter introductions and expository apparatus. Essential resource for graduates, professionals, and researchers in CS with an interest in operating system principles.","ISBN":"978-1-4757-3510-9","note":"Google-Books-ID: ya3hBwAAQBAJ","title-short":"Classic Operating Systems","language":"en","author":[{"family":"Hansen","given":"Per Brinch"}],"issued":{"date-parts":[["2013",4,17]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [2], the complete background of operating systems ranging from batch processing system in 1950s to the distributed system in 1990s is described. With time, new operating system is introduced according to market needs.
However, there are six operating systems worth mentioning hat altered the concept of user’s access to computer. These include simple batch system, open shop, multiprogramming, distributed system, personal computing, and time-sharing operating systems. Earlier, there was no methodology to lessen the computer idle time to tackle that issue. Therefore, the batch system was introduced. Batch system used the swift tape stations and small-sized satellites computers. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"57IGObUo","properties":{"formattedCitation":"[2]","plainCitation":"[2]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/hsp11vdX","uris":["http://zotero.org/users/local/YgsdZK9k/items/YQMBYQ65"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/YQMBYQ65"],"itemData":{"id":91,"type":"book","title":"Classic Operating Systems: From Batch Processing to Distributed Systems","publisher":"Springer Science & Business Media","number-of-pages":"597","source":"Google Books","abstract":"An essential reader containing the 25 most important papers in the development of modern operating systems for computer science and software engineering. The papers illustrate the major breakthroughs in operating system technology from the 1950s to the 1990s. The editor provides an overview chapter and puts all development in perspective with chapter introductions and expository apparatus. Essential resource for graduates, professionals, and researchers in CS with an interest in operating system principles.","ISBN":"978-1-4757-3510-9","note":"Google-Books-ID: ya3hBwAAQBAJ","title-short":"Classic Operating Systems","language":"en","author":[{"family":"Hansen","given":"Per Brinch"}],"issued":{"date-parts":[["2013",4,17]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [2] The batch systems required user to submit a program on a card and the operator would pit multiple programs on the input devices without interaction between the user and the computer system.
A time-sharing OS lets multiple users access resources of the computer at same time. The main objective is to reduce the response time by letting multiple programs utilize resources in their specified time slots ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"4QbRH7an","properties":{"formattedCitation":"[3]","plainCitation":"[3]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/qgqbQ9Tm","uris":["http://zotero.org/users/local/YgsdZK9k/items/YJYILRK7"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/YJYILRK7"],"itemData":{"id":95,"type":"book","title":"Operating System (WBUT)","publisher":"Vikas Publishing House","number-of-pages":"350","source":"Google Books","abstract":"Operating System is an insightful work that elaborates on fundamentals as well as advanced topics of the discipline. It offers an in-depth coverage of concepts, design and functions of an operating system irrespective of the hardware used. With neat illustrations and examples and presentation of difficult concepts in the simplest form, the aim is to make the subject crystal clear to the students, and the book extremely student-friendly. The book caters to undergraduate students of WBUT, who would find the conceptual discussions highly informative and enriching. Tailored as a guide for self-paced learning the book equips budding system programmers with the right knowledge and expertise. Key Features • Case studies of Linux and Windows 2000 to put theory concepts into practice • Points to Remember boxes for a quick recap • Check your Progress questions running along the text to test comprehension • Summary of the chapter, a list of key terms and insightful questions as retention aids • Past question papers with solution to equip students for future examinations","ISBN":"978-93-259-7416-6","note":"Google-Books-ID: i2ZDDAAAQBAJ","language":"en","author":[{"family":"Khurana","given":"Rohit"}]}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [3]. It can be described through an example of a mainframe computer, where numerous users are logged in simultaneously.
Networking operating systems are based on internet and computer networking. The Networking Operating system uses stack protocols in their architecture so as to provide means to computer networking ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"DGiFf4UB","properties":{"formattedCitation":"[5]","plainCitation":"[5]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/oweIddbL","uris":["http://zotero.org/users/local/YgsdZK9k/items/L2M4QYI5"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/L2M4QYI5"],"itemData":{"id":97,"type":"book","title":"UNIX Operating System: The Development Tutorial via UNIX Kernel Services","publisher":"Springer Science & Business Media","number-of-pages":"382","source":"Google Books","abstract":"\"UNIX Operating System: The Development Tutorial via UNIX Kernel Services\" introduces the hierarchical structure, principles, applications, kernel, shells, development, and management of the UNIX operation systems multi-dimensionally and systematically. It clarifies the natural bond between physical UNIX implementation and general operating system and software engineering theories, and presents self-explanatory illustrations for readers to visualize and understand the obscure relationships and intangible processes in UNIX operating system. This book is intended for engineers and researchers in the field of applicable computing and engineering modeling. Yukun Liu is an Associate Professor at the Department of Computer Science and Technology, Hebei University of Science and Technology, China; Professor Yong Yue is Director of the Institute for Research of Applicable Computing and Head of the Department of Computer Science and Technology, University of Bedfordshire, UK; Professor Liwei Guo is Dean of the College of Information Science and Engineering, Hebei University of Science and Technology, China.","ISBN":"978-3-642-20432-6","title-short":"UNIX Operating System","language":"en","author":[{"family":"Liu","given":"Yukun"},{"family":"Yue","given":"Yong"},{"family":"Guo","given":"Liwei"}],"issued":{"date-parts":[["2011",11,24]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [5]. Networking OS is fundamentally designed facilitate personal computer systems, workstations, and sometimes older terminals, connected on any local area network (LAN).
There is not only research conducted on Distributed Operating System but also, they are available for commercial use. The selection of machine in Distributed OS is automated ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"Z5ISsHsH","properties":{"formattedCitation":"[7]","plainCitation":"[7]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/ZCWrEcZe","uris":["http://zotero.org/users/local/YgsdZK9k/items/I4LU4PU2"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/I4LU4PU2"],"itemData":{"id":99,"type":"book","title":"DISTRIBUTED OPERATING SYSTEMS: CONCEPTS AND DESIGN","publisher":"PHI Learning Pvt. Ltd.","number-of-pages":"761","source":"Google Books","abstract":"The highly praised book in communications networking from IEEE Press, now available in the Eastern Economy Edition.This is a non-mathematical introduction to Distributed Operating Systems explaining the fundamental concepts and design principles of this emerging technology. As a textbook for students and as a self-study text for systems managers and software engineers, this book provides a concise and an informal introduction to the subject.","ISBN":"978-81-203-1380-4","note":"Google-Books-ID: SewHKWac2I4C","title-short":"DISTRIBUTED OPERATING SYSTEMS","language":"en","author":[{"family":"SINHA","given":"PRADEEP K."}],"issued":{"date-parts":[["1998",1,1]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [7]. The main purpose to develop a better operating system is to make low-cost and efficient microprocessor.
Criteria
In case at any time, operating system becomes defenseless, the application security is compromised as the operating system provides the environment to any application to run. There exists security policies and criteria for operating systems.
One of them is user Account policy which defines actions of a user for better security ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"JGAmUwmW","properties":{"formattedCitation":"[13]","plainCitation":"[13]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/vXPC1k8L","uris":["http://zotero.org/users/local/YgsdZK9k/items/S4ZRTQ9D"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/S4ZRTQ9D"],"itemData":{"id":101,"type":"webpage","title":"Computer Security - Policies - Tutorialspoint","URL":"https://www.tutorialspoint.com/computer_security/computer_security_policies.htm","accessed":{"date-parts":[["2019",11,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [13]. The number of users is limited on a server computer to Avoid system complexity and vulnerability. It also decreases the amount of time required on administration. Limiting number of administrators can also help make process easier.
Another policy that can be adopted is Network Services, which gives the least number of essential services on that main server computer. It decreases the permission to access for users and makes sure that users with access to web, cannot access the shell functions. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"aqL42anO","properties":{"formattedCitation":"[11]","plainCitation":"[11]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/2SMrm1vI","uris":["http://zotero.org/users/local/YgsdZK9k/items/F5FZAAVQ"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/F5FZAAVQ"],"itemData":{"id":105,"type":"webpage","title":"Techniques for Securing the Operating System","URL":"www.ibm.com/support/knowledgecenter/en/ssep7j_10.1.1/com.ibm.swg.ba.cognos.crn_arch.10.1.1.doc/c_securing_the_operating_system.html","language":"en-US","issued":{"date-parts":[["2014",10,24]]},"accessed":{"date-parts":[["2019",11,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [11]
File system permits to set permission and examination setting for folders and files etc. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"B1tDcw73","properties":{"formattedCitation":"[4]","plainCitation":"[4]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/mhFNfE9v","uris":["http://zotero.org/users/local/YgsdZK9k/items/IZ2W5DXT"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/IZ2W5DXT"],"itemData":{"id":107,"type":"book","title":"Inside Active Directory: A System Administrator's Guide","publisher":"Addison-Wesley Professional","number-of-pages":"964","source":"Google Books","abstract":"Inequality in Education: Comparative and International Perspectives is a compilation of conceptual chapters and national case studies that includes a series of methods for measuring education inequalities. The book provides up-to-date scholarly research on global trends in the distribution of formal schooling in national populations. It also offers a strategic comparative and international education policy statement on recent shifts in education inequality, and new approaches to explore, develop and improve comparative education and policy research globally. Contributing authors examine how education as a process interacts with government finance policy to form patterns of access to education services. In addition to case perspectives from 18 countries across six geographic regions, the volume includes six conceptual chapters on topics that influence education inequality, such as gender, disability, language and economics, and a summary chapter that presents new evidence on the pernicious consequences of inequality in the distribution of education. The book offers (1) a better and more holistic understanding of ways to measure education inequalities; and (2) strategies for facing the challenge of inequality in education in the processes of policy formation, planning and implementation at the local, regional, national and global levels.","ISBN":"978-0-201-61621-7","note":"Google-Books-ID: 36t7zE8VTeAC","title-short":"Inside Active Directory","language":"en","author":[{"family":"Kouti","given":"Sakari"},{"family":"Seitsonen","given":"Mika"}],"issued":{"date-parts":[["2002"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [4] It allows users read-only access to essential directories (except those who obtains exclusively), so even when the attackers gain access, they only have permission of a user for that application. In this way, it guards the assets that were neglected by the administrator. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"oMysUoHS","properties":{"formattedCitation":"[11]","plainCitation":"[11]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/2SMrm1vI","uris":["http://zotero.org/users/local/YgsdZK9k/items/F5FZAAVQ"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/F5FZAAVQ"],"itemData":{"id":105,"type":"webpage","title":"Techniques for Securing the Operating System","URL":"www.ibm.com/support/knowledgecenter/en/ssep7j_10.1.1/com.ibm.swg.ba.cognos.crn_arch.10.1.1.doc/c_securing_the_operating_system.html","language":"en-US","issued":{"date-parts":[["2014",10,24]]},"accessed":{"date-parts":[["2019",11,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [11]
Account policies promote OS security by developing and managing code or password policies, for example, strength and complexity of password rule and routinely password changing practice, at most number of failed log in tries etc. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"QKZHMIpe","properties":{"formattedCitation":"[8]","plainCitation":"[8]","dontUpdate":true,"noteIndex":0},"citationItems":[{"id":"tdevafZ2/vXPC1k8L","uris":["http://zotero.org/users/local/YgsdZK9k/items/S4ZRTQ9D"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/S4ZRTQ9D"],"itemData":{"id":101,"type":"webpage","title":"Computer Security - Policies - Tutorialspoint","URL":"https://www.tutorialspoint.com/computer_security/computer_security_policies.htm","accessed":{"date-parts":[["2019",11,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [8,7]
METHOD
Security threats
A risk which can possibly harm the data or the computer system is called a security threat to a computer. This harm can be physical like stealing device which has important information or virtual like a virus or hack. Today, there are several serious threats to computers and data due to political, or social reasons.
Level of Security
There are four level of security to determine how safe a computer system is. Following is the classification of these levels.
Type A: It is the highest level and uses proper design instructions and authentication practices.
Type B: It offers compulsory protection system. Its properties are same as that of a C2 system. It assigns a sensitivity label to every object. It is divided further in three types.
B1 –The security label which decides about access control is well-preserved.
B2 – System resource like storage objects receive sensitivity labels, review of events and provisions covert channels.
B3 – permits to generating lists or user groups for giving control or cancel access to a named object.
Type C: it facilitates in protection and user liability using audit aptitudes. Its types are as follows:
C1 −For protecting data from deletion or reading by other users and protecting isolated information, C1 integrates controls.
C2 − It has individual user access control is added to competences of a Cl level system.
Type D: It is the minimum level of security.
Kernel level Security:
Kernel Security level is used for the trusted and lowest level functions of OS. In this mode, the execution of code is completed and it restricts access to embedded hardware. It has control to execute any of CPU instructions and also can refer to any memory address.
Figure SEQ Figure \* ARABIC 2-Protection ring ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"zg9VmxXP","properties":{"formattedCitation":"[12]","plainCitation":"[12]","noteIndex":0},"citationItems":[{"id":8,"uris":["http://zotero.org/users/6144444/items/64DVZX6D"],"uri":["http://zotero.org/users/6144444/items/64DVZX6D"],"itemData":{"id":8,"type":"webpage","title":"CISSP Security Mechanisms","container-title":"ASM , Rockville , Maryland","abstract":"Although a robust architecture is a good start, real security requires that you have security mechanisms in place to control processes and applications. Some good security mechanisms are described in the following sections. Process Isolation Process isolation is required to maintain a high level of system trust. To be certified as a multilevel security... Read more »","URL":"https://asmed.com/cissp-security-mechanisms/","language":"en-US","issued":{"date-parts":[["2016",3,3]]},"accessed":{"date-parts":[["2019",11,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [12]
The model of protection ring gives an idea of different levels of security for an operating system.
3.4 Ways to avoid security Issues:
To avoid security issues in conventional operating systems, security policies related to who can access the system, must be appropriately implemented. The use of firewall, even with internet connected, the ensures local security and only authorized traffic passes. Another way to keep system and data safe is to utilize encryption technique. It is used when data is sent over Internet with risk of being exposed to others. The message I encoded and the key of encryption is only with authorized receiver. Setting password is another way to keep the log in secure.
FINDINGS
It is clear that the security system for present conventional OS is not sufficient to sustain its integrity and discretion.
4.1 Case Study:
In such conditions, Mandatory Access Control (MAC) is required to meet the needs. However, due to shortcomings including scalability, complexity, cost, maintenance etc., it cannot be applied to conventional OS.
The National Security Agency (NSA) has collaborated with Secure Computing Corporation (SCC) and developed accommodating MAC architecture which is termed as Flask. It will overcome shortcomings of conventional MAC. They implemented it in Linux OS to generate a prototype called Security-Enhanced Linux (SELinux). In addition to this, NAI labs presented a sample policy outline to determine and showcase the advantages of MAC architecture. This will serve as foundation for other to implement ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"dBQcK2Qw","properties":{"formattedCitation":"[6]","plainCitation":"[6]","noteIndex":0},"citationItems":[{"id":6,"uris":["http://zotero.org/users/6144444/items/ZHME7QYM"],"uri":["http://zotero.org/users/6144444/items/ZHME7QYM"],"itemData":{"id":6,"type":"webpage","title":"Integrating Flexible Support for Security Policies into the Linux Operating System - Linux Security Server Security","container-title":"Linux Security","abstract":"integrating flexible support for security policies into the linux operating system 3499 This article discusses implementing Mandatory Access Control in the SE L","URL":"https://linuxsecurity.com/news/server-security/integrating-flexible-support-for-security-policies-into-the-linux-operating-system-3499","language":"en-gb","author":[{"family":"Pell","given":"Anthony"}],"accessed":{"date-parts":[["2019",11,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [6].
DISCUSSION
It is observed that steps are taken to makes this innovative technology accessible to a widespread public and to aid more research in safe OS. Threats can enter a computer system through web simply or a peripheral device when connected to it. If hacker accesses the physical access to a server, no matter how secure web is, the system becomes vulnerable to the attacker. OS Security comprehends every precautionary step that will guard the data on computer that can be removed, modified, and stolen in case OS security is in jeopardy. Any system is built on these four levels of security, according to its sensitivity.
FUTURE ASPECTS
Every day, new threats emerge and new ways to combat them are needed. It is a given that the security has to be improved. To keep devices secure, Multi factor Authentication (MFA) has been practiced for quite a while. It requires password, as well as biometric scan and sometime any specific information. However, it is observed that now a days, username or password are not sufficient.
Evidently, a further protected system for verification is required. Intel has begun place new validation solution in sixth-generation Core vPro processor, which has capacity to combine multiple factors of hardware simultaneously to authenticate. Deep learning is an upcoming technology and Deep learning merged with operating systems structure can open up new path to technological advancement.
CONCLUSION
In conclusion, the security of an operating system is an inevitable phenomenon which needs maximum attention. Operating system security guarantees safe environment to run applications and perform tasks. There is no safety parameter that can alone protect the entire operating system. An appropriate mechanism has to be developed in order to achieve system security. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"RLynvbzP","properties":{"formattedCitation":"[10]","plainCitation":"[10]","noteIndex":0},"citationItems":[{"id":"tdevafZ2/tK7krWjU","uris":["http://zotero.org/users/local/YgsdZK9k/items/3QV8SGLC"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/3QV8SGLC"],"itemData":{"id":93,"type":"book","title":"21st National Information Systems Security Conference: Building the Information Security Bridge to the 21st Century : October 5-8, 1998, Hyatt Regency Crystal City, Arlington, Va","publisher":"National Institute of Standards and Technology","number-of-pages":"854","source":"Google Books","note":"Google-Books-ID: 5g0SAQAAMAAJ","title-short":"21st National Information Systems Security Conference","language":"en","issued":{"date-parts":[["1998"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} [10] It is to be noted that an extremely safe security system will not be enough until it has application dedicated security mechanism.
REFERENCES
ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY [1]Michael Burtscher. 2007. System and method for kernel-level pestware management. Retrieved November 11, 2019 from https://patents.google.com/patent/US20070094496A1/en
[2]Per Brinch Hansen. 2013. Classic Operating Systems: From Batch Processing to Distributed Systems. Springer Science & Business Media.
[3]Rohit Khurana. Operating System (WBUT). Vikas Publishing House.
[4]Sakari Kouti and Mika Seitsonen. 2002. Inside Active Directory: A System Administrator’s Guide. Addison-Wesley Professional.
[5]Yukun Liu, Yong Yue, and Liwei Guo. 2011. UNIX Operating System: The Development Tutorial via UNIX Kernel Services. Springer Science & Business Media.
[6]Anthony Pell. Integrating Flexible Support for Security Policies into the Linux Operating System - Linux Security Server Security. Linux Security. Retrieved November 11, 2019 from https://linuxsecurity.com/news/server-security/integrating-flexible-support-for-security-policies-into-the-linux-operating-system-3499
[7]PRADEEP K. SINHA. 1998. DISTRIBUTED OPERATING SYSTEMS: CONCEPTS AND DESIGN. PHI Learning Pvt. Ltd.
[8]Steven Hand. Operating Systems. Retrieved November 11, 2019 from https://www.cl.cam.ac.uk/teaching/1011/OpSystems/os1a-slides.pdf
[9]Yepeng Yao, Liya Su, Chen Zhang, Zhigang Lu, and Baoxu Liu. 2019. Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection. In Computational Science – ICCS 2019, João M. F. Rodrigues, Pedro J. S. Cardoso, Jânio Monteiro, Roberto Lam, Valeria V. Krzhizhanovskaya, Michael H. Lees, Jack J. Dongarra and Peter M.A. Sloot (eds.). Springer International Publishing, Cham, 102–115. DOI:https://doi.org/10.1007/978-3-030-22741-8_8
[10]1998. 21st National Information Systems Security Conference: Building the Information Security Bridge to the 21st Century : October 5-8, 1998, Hyatt Regency Crystal City, Arlington, Va. National Institute of Standards and Technology.
[11]2014. Techniques for Securing the Operating System. Retrieved November 11, 2019 from www.ibm.com/support/knowledgecenter/en/ssep7j_10.1.1/com.ibm.swg.ba.cognos.crn_arch.10.1.1.doc/c_securing_the_operating_system.html
[12]2016. CISSP Security Mechanisms. ASM , Rockville , Maryland. Retrieved November 11, 2019 from https://asmed.com/cissp-security-mechanisms/
[13]Computer Security - Policies - Tutorialspoint. Retrieved November 11, 2019 from https://www.tutorialspoint.com/computer_security/computer_security_policies.htm
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net