Question: C . Operating System Security Survey 1 . RequirementsWe have mentioned that there are two major security topics with Operating Systems, which are process protection

C. Operating System Security Survey1. RequirementsWe have mentioned that there are two major security topics with Operating Systems, which are process protection and resource access control. However, to enforce the security with operating systems, there are a lot of other techniques, such as encrypting all data stored in the disk.Students are asked to include as many aspects as possible and make your survey in a layering fashion. For example, process protection application permission access control encryption firewall Internet attacks defense. For each layer, you need to analyze all methods you can find. Meanwhile, you can mention some topics, such as malware detection.Students are asked to make a thoughtful survey about operating system security. You need to list and compare different techniques for the same purpose. For example, compile-time buffer overflow defense methods vs. runtime buffer overflow defense methods. You cannot gain full points if you just briefly introduce them. You need to address your own thinking. For example, you consider runtime buffer overflow defense methods are better. You should list all your reasons in details. The creative thinking contents should be at least 40% of the whole contents.Meanwhile, students can also select one topic related to operating system security. Students need to analyze this topic comprehensively, including introduction, threats, counter methods, and their own thinking. Experiments are strongly suggested. For example, malware detection. You need to explain how malware works and how to detect them from the perspective of operating system. Such as process, memory, user model, and kernel model.Furthermore, your survey papers should be graduated level academic paper. You must include introduction, the main contents, your conclusion, and cited reference. The paper length should be at least 4 pages with 11-point font.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!