Operating system security

--Originally published at Computer and Information Security

7050697671_954720aabc_z

An operating system is a program that manages the resources and other programs in the computer, it also allows the user to interact with the computer either through a command line or a graphical user interface.

One of the many responsibilities of the operating system is to protect the resources and the user from threats. To do this there are several methods that operating systems use:

Authentication

Operating systems authenticate using the following ways:

  • Username & password.
  • User card/key where the user must inter a key generated by a key generator or punch a card in a card slot.
  • User fingerprint/eye retina/signature.

One time password

In this method a unique password is required every time a user tries to login, after the password has been used it is rendered useless and a new password is required. One time passwords can be implemented by:

  • Random numbers.
  • Key generators.
  • Network password: where a one time password is sent to a mobile or email to registered users.

Made in collaboration with Marysol.

Flickr photo by quapan https://www.flickr.com/photos/hinkelstone/7050697671 shared under a Creative Commons (BY) license.