The operating system is the backbone of every modern computer system, managing the system's resources and executing applications. Therefore, it is essential to improve operating system security to ensure data integrity, confidentiality, and availability. When discussing secure operating systems, we generally refer to security-focused operating systems and security-evaluated operating systems. In critical environments, such as governments and military systems, that typically have higher security restrictions, security-evaluated operating systems are a convenient option used in other countries, ensuring those systems fulfill a set of security requirements. In addition, a trend toward more hardware security components, especially for separating cryptographic functions and implementing critical operations, has emerged. Although using secure operating systems is not a definitive solution to protect against all the dangers of current cyberspace, it is clear that it can reduce the impact of individual vulnerable applications or modules being exploited on the whole system.
CITATION STYLE
Romá, L., & Tellenbach, B. (2023). Secure operating system. In Trends in Data Protection and Encryption Technologies (pp. 115–120). Springer Nature. https://doi.org/10.1007/978-3-031-33386-6_21
Mendeley helps you to discover research relevant for your work.