Repository logo

Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques

Published version

Repository DOI

Change log


Akhtar, Zarif Bin 


jats:titleAbstract</jats:title> jats:pOperating system (OS) security is paramount in ensuring the integrity, confidentiality, and availability of computer systems and data. This research manuscript presents a comprehensive investigation into the multifaceted domain of OS security, aiming to enhance understanding, identify challenges, and propose effective solutions. The research methodology integrates diverse approaches, including an extensive exploration for available knowledge process mechanics, empirical data collection, case studies investigations, experimental analysis, comparative studies, qualitative analysis, synthesis, and interpretation. Through various experimental perspectives, theoretical foundations, historical developments, and current trends in OS security are also explored. Empirical data collection involves gathering insights from publicly available reports, security advisories, case studies, and expert interviews to capture real-world perspectives and experiences. Case studies illustrate practical implications of security strategies, while experimental analysis evaluates the efficacy of security measures in controlled environments. Comparative studies and qualitative analysis provide insights into strengths, limitations, and emerging trends in OS security. The synthesis and interpretation of the findings offer actionable insights for improving OS security practices, policy recommendations, and providing towards future research directions. This research contributes to advancing knowledge in OS security and informs the development of effective strategies to safeguard computer systems against evolving threats and vulnerabilities.</jats:p>


Peer reviewed: True

Acknowledgements: The idea representation with the research focusses along with the context concerning the investigative exploration and manuscript writing was done by the author himself. All the datasets, data models, data materials, data information, computing toolsets used and retrieved for the conduction concerning this research are mentioned within the manuscript and acknowledged with its associated references where appropriate.

Publication status: Published


Network Security, Operating Systems (OS), Cryptography, Privacy, Computing, OS Security, Security, Data Security

Journal Title

International Journal of Advanced Network, Monitoring and Controls

Conference Name

Journal ISSN


Volume Title


Walter de Gruyter GmbH