Throughout the course, you have explored how operating systems and hardware integrate and the issues that arise from that integration. Conduct some research and provide an example of a specific operating system vulnerability disclosed in the last 12 months. Operating systems can include Windows, Mac OS, Linux/Unix, or other relevant platforms. Your example should focus on one of the following topics:
Privileged and nonprivileged states
Application processes and threads
Memory (real, virtual, and management)
File systems
In your response posts, describe a remediation tactic to address the vulnerability identified by each of your peers. The tactic you select should be guided by one of the Fundamental Security Design Principles.
Leave a Reply
You must be logged in to post a comment.