Question: C . Operating System Security Survey 1 . Requirements We have mentioned that there are two major security topics with Operating Systems, which are process

C. Operating System Security Survey
1. Requirements
We have mentioned that there are two major security topics with Operating Systems, which are process protection and resource access control. However, to enforce the security with operating systems, there are a lot of other techniques, such as encrypting all data stored in the disk.
Students are asked to include as many aspects as possible and make your survey in a layering fashion. For example, process protection \(\rightarrow \) application permission \(\rightarrow \) access control \(\rightarrow \) encryption \(\rightarrow \) firewall \(\rightarrow \) Internet attacks defense. For each layer, you need to analyze all methods you can find. Meanwhile, you can mention some topics, such as malware detection.
Students are asked to make a thoughtful survey about operating system security. You need to list and compare different techniques for the same purpose. For example, compile-time buffer overflow defense methods vs. runtime buffer overflow defense methods. You cannot gain full points if you just briefly introduce them. You need to address your own thinking. For example, you consider runtime buffer overflow defense methods are better. You should list all your reasons in details. The creative thinking contents should be at least \(40\%\) of the whole contents.
Meanwhile, students can also select one topic related to operating system security. Students need to analyze this topic comprehensively, including introduction, threats, counter methods, and their own thinking. Experiments are strongly suggested. For example, malware detection. You need to explain how malware works and how to detect them from the perspective of operating system. Such as process, memory, user model, and kernel model.
Furthermore, your survey papers should be graduated level academic paper. You must include introduction, the main contents, your conclusion, and cited reference. The paper length should be at least 4 pages with 11-point font.
C . Operating System Security Survey 1 .

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!