5.6 Securing the Operating System