2.4 Securing the Operating System