Repository logo
 

Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques

Published version
Peer-reviewed

Repository DOI


Change log

Authors

Akhtar, Zarif Bin 

Abstract

jats:titleAbstract</jats:title> jats:pOperating system (OS) security is paramount in ensuring the integrity, confidentiality, and availability of computer systems and data. This research manuscript presents a comprehensive investigation into the multifaceted domain of OS security, aiming to enhance understanding, identify challenges, and propose effective solutions. The research methodology integrates diverse approaches, including an extensive exploration for available knowledge process mechanics, empirical data collection, case studies investigations, experimental analysis, comparative studies, qualitative analysis, synthesis, and interpretation. Through various experimental perspectives, theoretical foundations, historical developments, and current trends in OS security are also explored. Empirical data collection involves gathering insights from publicly available reports, security advisories, case studies, and expert interviews to capture real-world perspectives and experiences. Case studies illustrate practical implications of security strategies, while experimental analysis evaluates the efficacy of security measures in controlled environments. Comparative studies and qualitative analysis provide insights into strengths, limitations, and emerging trends in OS security. The synthesis and interpretation of the findings offer actionable insights for improving OS security practices, policy recommendations, and providing towards future research directions. This research contributes to advancing knowledge in OS security and informs the development of effective strategies to safeguard computer systems against evolving threats and vulnerabilities.</jats:p>

Description

Peer reviewed: True


Acknowledgements: The idea representation with the research focusses along with the context concerning the investigative exploration and manuscript writing was done by the author himself. All the datasets, data models, data materials, data information, computing toolsets used and retrieved for the conduction concerning this research are mentioned within the manuscript and acknowledged with its associated references where appropriate.


Publication status: Published

Keywords

Network Security, Operating Systems (OS), Cryptography, Privacy, Computing, OS Security, Security, Data Security

Journal Title

International Journal of Advanced Network, Monitoring and Controls

Conference Name

Journal ISSN

2470-8038

Volume Title

Publisher

Walter de Gruyter GmbH