Security in Computing
The OS is crucial for enhancing the integrity, confidentiality, and availability of the computer system by improving the data sharing environment, file and I/O user access inter-process communication, protection of vital data, and user authentication capabilities. The system resources that require protection are the memory of the computer, the I/O devices such as disks, printers as well as programs and sub procedures, the computer system related networks and the sharable data. The protection of these systems offers a layer of security that is uniquely guaranteed by the OS.
A secure OS should have certain design alignments that enhance security. The OS should be simple in design. The OS should also have a layered design also to enable a layered trust. This allows the prioritization of security measures. The very tight controls will be designed for critical functions. The resource access controls can be enforced via virtualization, segmentation, protection of the hardware memory and via the reference monitors. The OS controls access to the data and files in the computing environment. Access control systems use authentications to allow read, write, delete or execute functions to enhance security.
The rootkit is software that maliciously attacks the integrity of the OS. The rootkit attaches itself to the OS and becomes difficult to be identified. At times rootkits can be identified and partially removed, but re-establish themselves again. The rootkits can manipulate the essential OS functions and are a threat to a safe computing environment. The TCB protects the integrity of the OS and its basic functions. In the early 70s security controls were developed. A system evaluation criterion was established in 1983, 1991 and 1994. In 1999, the TCPA was formed to promote trust and security in computing. In alignment to new threats and needs the 2003 TCPA that enhanced security measures for mobile device platforms.