Skip to main content
Have a personal or library account? Click to login
Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques Cover

Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques

Open Access
|Mar 2024

Figures & Tables

Figure 1.

A Visualization of Standard security attacks

Figure 2.

An illustration of Program Threats (On the left with the layout for a typical stack frame, Hypothetical stack frame for (a) before then (b) after, on the right A boot-sector computer virus)

Figure 3.

The Morris Internet worm an illustration

Figure 4.

Cryptography Security Tool in action (on the left A secure communication over an insecure medium, in the middle Encryption and decryption using RSA asymmetric cryptography, on the right A man-in-the-middle attack on asymmetric cryptography)

Figure 5.

An illustration of Domain separation via firewall

Figure 6.

An overall visualization of the findings
Language: English
Page range: 100 - 111
Published on: Mar 28, 2024
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2024 Zarif Bin Akhtar, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.