We have mentioned that there are two major security topics with Operating System

We
have mentioned that there are two major security topics with
Operating Systems, which are process protection and resource access
control. However, to enforce security with operating systems,
there are a lot of other techniques, such as encrypting all data
stored in the disk.
Students
are asked to include as many aspects as possible and make your survey
in a layering fashion. For example, process protection to application permission to access control to encryption to firewall to Internet attacks defense. For each layer, you need to analyze all
methods you can find. Meanwhile, you can mention some topics, such as
malware detection.
Students
are asked to make a thoughtful survey about operating system
security. You need to list and compare different techniques for the
same purpose. For example, compile-time buffer overflow defense
methods vs. runtime buffer overflow defense methods. You cannot gain
full points if you just briefly introduce them. You need to address
your own thinking. For example, you consider runtime buffer overflow
defense methods are better. You should list all your reasons in
details. The creative thinking contents should be at least 40% of the
whole contents.
Meanwhile,
students can also select one topic related to operating system
security. Students need to analyze this topic comprehensively,
including introduction, threats, counter methods, and their own
thinking. Experiments are strongly suggested. For example, malware
detection. You need to explain how malware works and how to detect
them from the perspective of operating system. Such as process,
memory, user model, and kernel model.
Resource
Access Control Policies
Which kinds of resource need to
be protected? How to control the access from users and applications?
List related techniques and compare them. If you can design some new
solution, explain it and present its advantages.
2. Internet
Attack Defense Methods
Firewall is used to filter data
packages sending from and receiving by the system. Are there any
other related techniques? Compare them and address your own thinking.