Introduction to Operating Systems Security

2 min read Updated Fri Apr 24 2026 03:46:02 GMT+0000 (Coordinated Universal Time)

Computer Security is the study of protecting the assets of a computer system (hardware, software, data, and people).

Assets

Hardware

Computers, devices, network gear.

Software

Operating systems, utilities, applications.

Data

Documents, emails, media files.

People

System admins, users, customers.

Identity

A digital identity includes all the information about an individual, organization, or device that exists online, such as names, email addresses, or medical history.

Vulnerability

A weakness in the security system.

CIA Triad

A fundamental model in information security that defines the core objectives required to protect information systems.

Stands for:

  • Confidentiality
    Ensures unauthorized parties cannot access information.
  • Integrity
    Protects information from being modified or deleted.
  • Availability
    Ensures information is accessible for authorized parties.

When all the objectives are met, the system is said to be secure.

Sometimes additional objectives are included as well.

  • Authentication
    Proving that the identity of a person or device they are claiming to be. Can be thought of as integrity of identity.
  • Nonrepudiation
    Assurance that actions or messages cannot be denied.

Types of Harm

  • Modification
    Unauthorized changes to data.
  • Fabrication
    Creation of counterfeit data or objects.
  • Interception
    Unauthorized access to data.
  • Interruption
    Making data unavailable or unusable.

Security Goals

  • Prevention
    Stop attacks before they happen.
  • Detection
    Identify violations as they occur.
  • Recovery
    Respond and restore after an attack.