Internal security issues
User identity verification
- The operating system must have some way of uniquely identifying you from another user
- The operating system also needs a way to insure that it IS you and not someone else
Filesystem permissions
- Controlling access to various documents, programs and functions of the system you use