wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Issues

profile
Angela Rodrigues
Jul 12, 2023
0 Likes
0 Discussions
24 Reads

Angela V Rodrigues-53003220025

Sybscit-A

Security issues

Set of privileges is assigned to a process in an OS. These processes state the resources the process may be allowed to use for example the memory, privileged system instructions ETC. The highest level of privilege is called as supervisor, administrator or root access. The root access allows the process to use all the functions and services of the operating system. It is therefore important that while designing a operating system, it has to be made sure that it has the ability to detect  malicious software or hacker trying to  gain privileges on the system especially the root access.

 

System access threats

 

 System access threats falls into 2 categories that is  intruders and malicious software.

 

Intruders

 

Intruders are also commonly known as hacker or cracker which is one of the most  threats to security. Intruders are classified into three types  that is masquerader,  misfeasor, clandestine user.

 

1)Masquerader: A person who is not authorised to use a computer but gains access to the system to misuse a legitimate users account.

 

2)Misfeasor:A legimate user who accesses resources that are not permitted to him or  Is permitted access but misuses his or her privileges.

 

3)Clandestine user:An individual who gains access to the supervisory control of the system and uses it to avoid auditing an access control or to restrain audit collection.

 

 Intruders can range between individuals that are simply curious about hacking but do not cause serious threats to the system and individuals that can access sensitive information or manipulate data or destroy a system which causes serious threats to the security of his system.Most intruders use system vulnerability i.e System weakness to gain access to an operating system.

 

Malicious software

 

Malicious software commonly referred to Malware, is perhaps the most advanced type of threat that exploit vulnerabilities Of a computing system. It does not possess a serious threat to computing system. Example of malware is virus, worms, logic bombs, backdoors etc.


Comments ()


Sign in

Read Next

File Organization and Access

Blog banner

Question

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Blog on health and fitness

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Cache Memory

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Types of Hackers

Blog banner

LINUX

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

IOT Hacking Techniques

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Password Generator - Lisp

Blog banner

Race Condition

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Memory Management

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Deadlock

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Education: Key to your Prosperity

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Deadlock

Blog banner

Different memory allocation strategies

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Service stratergy principles

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Student Grade Calculator in LISP

Blog banner

Interrupts - Types, Working & Importance

Blog banner

OS Assignment-3

Blog banner

Precision-Recall in Data Science

Blog banner

Linker

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

What is HTML?

Blog banner

NodeJs

Blog banner

How to make Pancakes

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Deadlock

Blog banner