Category: Operating System

  • “Exploring the Layers of Operating System Security: Techniques for Process Protection, Resource Access Control, and Internet Attack Defense”

    We
    have mentioned that there are two major security topics with
    Operating Systems, which are process protection and resource access
    control. However, to enforce security with operating systems,
    there are a lot of other techniques, such as encrypting all data
    stored in the disk.
    Students
    are asked to include as many aspects as possible and make your survey
    in a layering fashion. For example, process protection to application permission to access control to encryption to firewall to Internet attacks defense. For each layer, you need to analyze all
    methods you can find. Meanwhile, you can mention some topics, such as
    malware detection.
    Students
    are asked to make a thoughtful survey about operating system
    security. You need to list and compare different techniques for the
    same purpose. For example, compile-time buffer overflow defense
    methods vs. runtime buffer overflow defense methods. You cannot gain
    full points if you just briefly introduce them. You need to address
    your own thinking. For example, you consider runtime buffer overflow
    defense methods are better. You should list all your reasons in
    details. The creative thinking contents should be at least 40% of the
    whole contents.
    Meanwhile,
    students can also select one topic related to operating system
    security. Students need to analyze this topic comprehensively,
    including introduction, threats, counter methods, and their own
    thinking. Experiments are strongly suggested. For example, malware
    detection. You need to explain how malware works and how to detect
    them from the perspective of operating system. Such as process,
    memory, user model, and kernel model.
    Resource
    Access Control Policies
    Which kinds of resource need to
    be protected? How to control the access from users and applications?
    List related techniques and compare them. If you can design some new
    solution, explain it and present its advantages.
    2. Internet
    Attack Defense Methods
    Firewall is used to filter data
    packages sending from and receiving by the system. Are there any
    other related techniques? Compare them and address your own thinking.