wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Issues

profile
Angela Rodrigues
Jul 12, 2023
0 Likes
0 Discussions
24 Reads

Angela V Rodrigues-53003220025

Sybscit-A

Security issues

Set of privileges is assigned to a process in an OS. These processes state the resources the process may be allowed to use for example the memory, privileged system instructions ETC. The highest level of privilege is called as supervisor, administrator or root access. The root access allows the process to use all the functions and services of the operating system. It is therefore important that while designing a operating system, it has to be made sure that it has the ability to detect  malicious software or hacker trying to  gain privileges on the system especially the root access.

 

System access threats

 

 System access threats falls into 2 categories that is  intruders and malicious software.

 

Intruders

 

Intruders are also commonly known as hacker or cracker which is one of the most  threats to security. Intruders are classified into three types  that is masquerader,  misfeasor, clandestine user.

 

1)Masquerader: A person who is not authorised to use a computer but gains access to the system to misuse a legitimate users account.

 

2)Misfeasor:A legimate user who accesses resources that are not permitted to him or  Is permitted access but misuses his or her privileges.

 

3)Clandestine user:An individual who gains access to the supervisory control of the system and uses it to avoid auditing an access control or to restrain audit collection.

 

 Intruders can range between individuals that are simply curious about hacking but do not cause serious threats to the system and individuals that can access sensitive information or manipulate data or destroy a system which causes serious threats to the security of his system.Most intruders use system vulnerability i.e System weakness to gain access to an operating system.

 

Malicious software

 

Malicious software commonly referred to Malware, is perhaps the most advanced type of threat that exploit vulnerabilities Of a computing system. It does not possess a serious threat to computing system. Example of malware is virus, worms, logic bombs, backdoors etc.


Comments ()


Sign in

Read Next

 " Healing of Yoga "

Blog banner

Uniprocessor scheduling

Blog banner

Royal enfield

Blog banner

american greatines

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

Smitten Kitchen Keepers

Blog banner

Khau Galli – Vile Parle

Blog banner

Kernel in Operating System

Blog banner

The seven-step improvement process

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

An Overivew Of Cache Memory

Blog banner

Boxing

Blog banner

Device driver

Blog banner

What is Email? Uses of Emails

Blog banner

Privacy in Social Media and Online Services

Blog banner

Swiggi

Blog banner

Development Of Modern Operating System

Blog banner

Memory Management

Blog banner

A Heartfelt Act of Kindness

Blog banner

undefined

Blog banner

Social Media Marketing Trends 2022

Blog banner

Firewall in Computer Network

Blog banner

Facebook marketing

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Os assignment

Blog banner

Mumbai Metro 3

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Threat management

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Disk scheduling

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Wedding photographer

Blog banner

Direct Memory Access

Blog banner

WINDOWS I/ O

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Health is Wealth

Blog banner

social media issue

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

URL vs Domain

Blog banner