CH 4
CH 4
Yirga Y. (PhD)
[email protected]
Department of Information Technology
06/04/2024 Adanced information Security 1
Outline
• What is Operating System Security?
• Goal of Security System
• Threats to Operating System
• OS policies
• Buffer Overflow
• The main function of a buffer is to temporarily store data.
• Each buffer has a capacity of data it can hold.
• During a buffer overflow attack, the buffer or other
temporary data stores are overflowing with data.
• When the buffer overflows, the program attempting to
write the data may overwrite other memory locations
containing important information.
• Threat actors look for buffer overflow vulnerabilities,
which they can exploit to inject scripts that help them
hijack the system or crash it.
• Fully locked-down VM
• Should be used to provide access to sensitive data and
corporate systems, such as IT environments,
payment systems, and sensitive customer data.
• Unlocked, open VM
• Should be used to provide unrestricted access to
non-corporate resources. For example, full web
browsing sessions, installation of applications, and
use of external devices.
• Semi-locked-down VM
• Should be used to provide access to standard
corporate applications and resources, such as office
documents, company email, and internal services.