Operating System Security

1433 Words3 Pages

Fifteen years ago, operating system security was often nothing more than an afterthought to what were once considered “flashy” graphical user interfaces and the ability for a machine to multi-task. Over time, computers evolved from thirty ton, 1,800 square foot calculators to pocket-sized devices capable of surfing the web at lightening fast speeds (Mueller, 2010). As the design of computer technology has changed dramatically since its invention, so has the way humans interact with it. From what was once limited to simple word processing and command-line based applications, computers are now driving the global economy, autonomously operating remote transportation technologies, and securely operating critical infrastructure – all with a limited need for human interaction. In a world where technology is now at the cornerstone of the majority of the world population’s very way of life, it is fundamental to ensure that its foundation is secure.

At a computer’s most basic level, it is the operating system that enables humans to interact with the technology in a meaningful way. Operating systems tie together inputs and outputs, memory and process management, networking, and much more. Though no two operating systems are developed in exactly the same manner, common security themes can be identified that enable systems and valuable data to be protected from adversaries. Renowned security expert Bruce Schneier puts it best when he describes secure systems as ones that “make sure things work, not in the presence of random faults, but in the face of an intelligent and malicious adversary trying to ensure that things fail in the worst possible way at the worst possible time” (Anderson, 2009, p. 17). Three popular operating system sec...

... middle of paper ...

...are legally prohibited from utilizing the technology due to legislative restrictions – for example Russia, China, and Kazakhstan (PwC). In instances such as these, security administrators will likely be forced to use technologies such as smart cards or USB tokens to provide similar functionalities to the TPM.

Implementation of the TPM is fairly easy because most modern computers have TPM chips integrated as a standard hardware feature. Activating the TPM is commonly performed manually through a system’s BIOS, however many vendors offer packages that can automatically detect and configure the technology across an organization – making implementation incredibly easy. The process of enabling and configuring a TPM on a device typically only takes a few minutes, depending on the number of security measurements and other pieces of data that will be stored on the chip.

More about Operating System Security

Open Document