Module 07: Security & Protection
Security is not a feature; it is the foundation of modern operating systems. In this module, we move beyond basic user permissions to understand the deep architectural mechanisms that prevent code from destroying the system. We will explore how the hardware enforces isolation (Ring 0 vs Ring 3), how the OS manages access control (DAC vs MAC), and how cryptographic primitives build trust in a hostile environment.
1. 🗺️ Module Roadmap
- Protection Mechanisms
- Understand the Hardware/Software Contract.
- Deep dive into Protection Rings (User Mode vs Kernel Mode).
- Learn about Sandboxing and the Principle of Least Privilege.
- Access Control Lists (ACLs)
- Move beyond
chmod 777. - Master POSIX ACLs for granular file permissions.
- Compare Discretionary Access Control (DAC) vs Mandatory Access Control (MAC) (SELinux).
- Move beyond
- Authentication
- Stop storing plain-text passwords.
- Learn the mechanics of Hashing, Salting, and Peppering.
- Understand Work Factors (Argon2, Bcrypt) and why speed is the enemy.
- Malware and Viruses
- Anatomy of a Buffer Overflow (Stack Smashing).
- Understand how Viruses, Worms, and Ransomware operate.
- Learn about NX Bits and ASLR (Address Space Layout Randomization).
- Cryptography Basics
- Symmetric (AES) vs Asymmetric (RSA/ECC) encryption.
- How Digital Signatures guarantee integrity and authenticity.
- The role of PKI (Public Key Infrastructure).
- Module Review
- Flashcards for active recall.
- Cheat Sheet for quick reference.
- Key Takeaways summary.
Module Chapters
Chapter 01
Protection Mechanisms
Protection Mechanisms
Start Learning
Chapter 02
Access Control Lists (ACLs)
Access Control Lists (ACLs)
Start Learning
Chapter 03
Authentication
Authentication
Start Learning
Chapter 04
Malware and Viruses
Malware and Viruses
Start Learning
Chapter 05
Cryptography Basics
Cryptography Basics
Start Learning
Chapter 06
Module Review: Security & Protection
Module Review: Security & Protection
Start Learning