Skip to content

Week 03 Quiz

Test your understanding of the weekly concepts.

Format: 10 multiple-choice questions. Passing score: 70%. Time: Untimed.

Take Quiz
CSY101 Week 03 Beginner

Build OS fundamentals and Linux confidence before moving to reading resources.

Cybersecurity Essentials

Track your progress through this week's content

Week Introduction

๐Ÿ’ก Mental Model

The operating system is the security referee of the computer. It decides which programs run, who can access what data, and how resources are shared. When the OS is compromised, every layer above it becomes untrusted.

This week focuses on the OS as a security boundary: how it enforces isolation between processes, manages privileges, controls file access, and why these mechanisms are prime targets for attackers.

Learning Outcomes (Week 3 Focus)

By the end of this week, you should be able to:

  • LO2 - Technical Foundations: Explain how operating systems manage resources and enforce security boundaries
  • LO3 - Threat Landscape: Understand why OS-level compromise is catastrophic (privilege escalation attacks)
  • LO5 - Identity & Access: Connect OS user/permission models to access control principles

Lesson 3.1 ยท The OS as Security Referee

Core function: The operating system sits between hardware (physical resources) and applications (programs), mediating every interaction. Without an OS, programs would fight for resources and could directly manipulate hardware โ€” chaos.

What the OS manages:

  • CPU scheduling: Which program gets to execute when (prevents one app from hogging processor)
  • Memory allocation: Assigns RAM to programs, prevents them from reading each other's data
  • File system: Controls who can read/write/execute files
  • Device drivers: Manages access to hardware (disk, network, USB)
  • Process isolation: Keeps programs in separate containers so crashes don't spread

Security role: The OS is a policy enforcement point. It doesn't decide what's allowed (that's policy), but it enforces those decisions. If the OS is bypassed or compromised, all security controls above it become irrelevant.

Diagram showing the OS Kernel acting as a shield between Applications (top) and Hardware (bottom), blocking unauthorized access
The Operating System acts as the security referee, mediating all hardware access.

Real-world analogy: Think of the OS like airport security. Applications are passengers trying to board planes (access hardware). The OS checks tickets (permissions), scans bags (validates requests), and prevents unauthorized access to restricted areas (kernel space, other processes' memory).

Lesson 3.2 ยท Processes and Isolation (Security Containers)

Key concept: A process is a running instance of a program. When you double-click an application, the OS creates a process with its own isolated environment.

What each process gets:

Why isolation matters for security:

Visualisation of two distinct process cubes (Browser and Word) separated by a strong wall, blocking access attempts
Process isolation prevents a compromised application from accessing others' memory.

Attack goal: Breaking isolation

Attackers seek to escape process boundaries. Common techniques:

Defender takeaway: Isolation is only as strong as the OS kernel enforces it. Kernel vulnerabilities are catastrophic because they undermine all process isolation.

Lesson 3.3 ยท Users, Privileges, and the Principle of Least Privilege

Core security principle: Users and processes should have only the minimum privileges needed to accomplish their tasks โ€” no more. Every additional privilege is potential attack surface.

Privilege hierarchy (typical OS model):

Pyramid diagram: Kernel (Ring 0) at top/center, Root/Admin in middle, User Space at bottom/outer ring
Privilege hierarchy: The higher you go, the more damage you can do (and the harder you are to detect).

Why privilege matters:

Imagine an attacker exploits a vulnerability in your web browser. If you're logged in as:

Privilege escalation attacks:

Most attacks start with limited access (standard user or compromised service). The attacker then exploits OS vulnerabilities to "escalate" to administrator/root. Common techniques:

Defender principle: Run everything with minimum necessary privilege. Don't browse the web as admin. Don't run services as root unless absolutely required. Assume compromise and limit blast radius.

Lesson 3.4 ยท File Permissions: Access Control in Practice

๐Ÿ’ก Mental model

Every file has a "permission label" that defines who can do what. The OS enforces these labels before allowing any file operation.

The permission triad (Read, Write, Execute):

Permission groups (Unix/Linux model):

Example: File permissions -rw-r--r-- mean:

Common misconfigurations (dangerous patterns):

Real-world example: In 2019, Capital One breach involved misconfigured AWS permissions โ€” a firewall configuration flaw allowed access to files that should have been restricted. 100 million customer records exposed.

Defender principle: Default to restrictive permissions. Grant access explicitly only when needed. Audit permissions regularly, especially on sensitive files (passwords, keys, configs).

Lesson 3.5 ยท Why the OS Is Prime Attack Target

Strategic reality: Compromising the operating system gives attackers control over everything above it. This is why kernel exploits are among the most valuable vulnerabilities.

Attack value hierarchy:

Why OS compromise is catastrophic:

Defense strategy: OS hardening

Self-Check Questions (Test Your Understanding)

Answer these in your own words (2-3 sentences each):

  1. Why is the OS called a "security referee"? What would happen if applications could access hardware directly?
  2. Explain process isolation. Why can't one process normally read another process's memory?
  3. What is privilege escalation? Why do attackers seek it?
  4. Give one example of a dangerous file permission configuration and explain the risk.
  5. Why is kernel-level compromise more dangerous than user-level compromise?

Lab 3 ยท OS Security Boundaries and Privilege Analysis

Time estimate: 30-45 minutes

Objective: Map privilege boundaries in an operating system and analyze what happens when those boundaries fail. You will trace how privilege escalation attacks work and propose defenses.

Step 1: Choose Your OS Context (5 minutes)

Select one scenario (or propose your own):

Why it matters: Privilege models differ by context โ€” understand the environment before analyzing risk.

Step 2: Map Privilege Levels (10 minutes)

Identify at least 3 privilege levels in your chosen system:

Example for Linux web server:

Step 3: Identify a Critical File (10 minutes)

Choose one security-critical file in your system and analyze its permissions:

Example for /etc/shadow (Linux):

Step 4: Trace a Privilege Escalation Attack (10 minutes)

Describe a realistic attack scenario where an attacker escalates from low privilege to high:

Example attack:

Step 5: Propose Defenses (5 minutes)

Identify at least two controls that would prevent or detect the attack:

Example defenses:

Step 6: Synthesis (5 minutes)

Write a short paragraph (3-5 sentences) answering:

"Why is the operating system called a security boundary? What makes OS-level compromise more dangerous than application-level compromise?"

Example answer:

The operating system is a security boundary because it sits between all applications and hardware, enforcing isolation and access controls. When the OS is compromised, attackers can bypass all higher-level security measures because the OS is the ultimate authority on what's allowed. Application-level compromise affects only that app's data and capabilities, but OS-level compromise grants control over all processes, all users, and the ability to hide malicious activity from detection tools.

Success Criteria (What "Good" Looks Like)

Your lab is successful if you:

Extension (For Advanced Students)

If you finish early, explore these questions:

๐ŸŽฏ Hands-On Labs (Free & Essential)

Build OS fundamentals and Linux confidence before moving to reading resources.

๐ŸŽฎ TryHackMe: Linux Fundamentals Part 1

What you'll do: Navigate the Linux filesystem, understand users/groups, and practice essential commands.
Why it matters: Most security tooling runs on Linux. OS-level security begins with command-line literacy and permission awareness.
Time estimate: 1.5-2 hours

Start TryHackMe Linux Fundamentals โ†’

๐ŸŽฏ OverTheWire: Bandit (Levels 0-6)

What you'll do: Practice Linux navigation, file permissions, and basic command usage while solving progressively harder tasks.
Why it matters: Bandit forces you to understand OS permissions and file access โ€” core concepts behind privilege escalation.
Time estimate: 1.5-2.5 hours

Start OverTheWire Bandit โ†’

๐Ÿ” HackTheBox Academy: Linux Fundamentals

What you'll do: Work through structured lessons on Linux architecture, permissions, processes, and security basics.
Why it matters: HTB Academy reinforces OS concepts with real-world security context and practical exercises.
Time estimate: 2-3 hours

Start HTB Linux Fundamentals โ†’

๐Ÿ’ก Lab Tip: Keep a small Linux command journal. Write the command, what it did, and why you used it. This builds long-term muscle memory.

Resources (Free + Authoritative)

Work through these in order. Focus on security-relevant concepts.

๐Ÿ“˜ OSTEP - Operating Systems: Three Easy Pieces

What to read: Chapters on "Processes" and "Address Spaces" (skim for concepts, not implementation details).
Why it matters: Free textbook from University of Wisconsin. Best explanation of how OS provides isolation.
Time estimate: 30 minutes (focus on conceptual understanding)

Open Resource

๐ŸŽฅ Computerphile - Processes & Privilege (Video)

What to watch: Full video on how operating systems manage user privileges.
Why it matters: Visual explanation of privilege levels and why escalation is dangerous.
Time estimate: 15 minutes

Open Resource

๐Ÿ“˜ Linux File Permissions Explained (Red Hat)

What to read: Entire article on Unix/Linux permission model.
Why it matters: Even if you use Windows, understanding Unix permissions teaches access control principles.
Time estimate: 20 minutes

Open Resource

๐Ÿ“˜ NIST SP 800-123 - Guide to General Server Security

What to read: Section 2 on "Server Security Principles" (pages 4-10).
Why it matters: Shows how OS hardening applies in real enterprise environments.
Time estimate: 20 minutes

Open Resource

Tip: Completion and XP persist via localStorage. If progress doesn't update immediately, refresh once.

Weekly Reflection Prompt

Aligned to LO2 (Technical Foundations) and LO5 (Identity & Access)

Write 200-300 words answering this prompt:

Explain why privilege escalation is considered one of the most critical attack classes. Use a specific example from this week's content (processes, file permissions, or user accounts).

In your answer, include:

What good looks like: You explain the cascade effect of privilege escalation โ€” how gaining one level unlocks access to many more resources. You show understanding that the OS is the ultimate authority, so controlling it means controlling everything above.