Have a personal or library account? Click to login

Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques

Open Access
|Mar 2024

Figures & Tables

Figure 1.

A Visualization of Standard security attacks
A Visualization of Standard security attacks

Figure 2.

An illustration of Program Threats (On the left with the layout for a typical stack frame, Hypothetical stack frame for (a) before then (b) after, on the right A boot-sector computer virus)
An illustration of Program Threats (On the left with the layout for a typical stack frame, Hypothetical stack frame for (a) before then (b) after, on the right A boot-sector computer virus)

Figure 3.

The Morris Internet worm an illustration
The Morris Internet worm an illustration

Figure 4.

Cryptography Security Tool in action (on the left A secure communication over an insecure medium, in the middle Encryption and decryption using RSA asymmetric cryptography, on the right A man-in-the-middle attack on asymmetric cryptography)
Cryptography Security Tool in action (on the left A secure communication over an insecure medium, in the middle Encryption and decryption using RSA asymmetric cryptography, on the right A man-in-the-middle attack on asymmetric cryptography)

Figure 5.

An illustration of Domain separation via firewall
An illustration of Domain separation via firewall

Figure 6.

An overall visualization of the findings
An overall visualization of the findings
Language: English
Page range: 100 - 111
Published on: Mar 28, 2024
Published by: Sciendo
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2024 Zarif Bin Akhtar, published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.