wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Issues

profile
Angela Rodrigues
Jul 12, 2023
0 Likes
0 Discussions
25 Reads

Angela V Rodrigues-53003220025

Sybscit-A

Security issues

Set of privileges is assigned to a process in an OS. These processes state the resources the process may be allowed to use for example the memory, privileged system instructions ETC. The highest level of privilege is called as supervisor, administrator or root access. The root access allows the process to use all the functions and services of the operating system. It is therefore important that while designing a operating system, it has to be made sure that it has the ability to detect  malicious software or hacker trying to  gain privileges on the system especially the root access.

 

System access threats

 

 System access threats falls into 2 categories that is  intruders and malicious software.

 

Intruders

 

Intruders are also commonly known as hacker or cracker which is one of the most  threats to security. Intruders are classified into three types  that is masquerader,  misfeasor, clandestine user.

 

1)Masquerader: A person who is not authorised to use a computer but gains access to the system to misuse a legitimate users account.

 

2)Misfeasor:A legimate user who accesses resources that are not permitted to him or  Is permitted access but misuses his or her privileges.

 

3)Clandestine user:An individual who gains access to the supervisory control of the system and uses it to avoid auditing an access control or to restrain audit collection.

 

 Intruders can range between individuals that are simply curious about hacking but do not cause serious threats to the system and individuals that can access sensitive information or manipulate data or destroy a system which causes serious threats to the security of his system.Most intruders use system vulnerability i.e System weakness to gain access to an operating system.

 

Malicious software

 

Malicious software commonly referred to Malware, is perhaps the most advanced type of threat that exploit vulnerabilities Of a computing system. It does not possess a serious threat to computing system. Example of malware is virus, worms, logic bombs, backdoors etc.


Comments ()


Sign in

Read Next

Cache Memory(142)

Blog banner

Memory management and virtual memory

Blog banner

FIREWALL

Blog banner

Vulnerability Assessment

Blog banner

Memory management

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Ghee vs. Coconut Oil vs. Mustard Oil: Which Cooking Fat Wins for Indian Food?

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

File Management

Blog banner

Deadlock

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Flipkart

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Os(Computer security threats)

Blog banner

The Peephole

Blog banner

Virtual memory

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

APACHE KAFKA

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Memory Management

Blog banner

Service Operations in ITSM

Blog banner

Why Seasonal Summer Foods Are Best for Your Health?

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Google

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Buffer overflow

Blog banner

INTRODUCTION

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Developments in Modern Operating Systems

Blog banner

Proof-of-Stake (PoS)

Blog banner

Types of Malware in Cyber Security

Blog banner

Social media

Blog banner

Platonic Solids

Blog banner

Health and fitness

Blog banner

Deadlocks

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Blockchain technology: security risk and prevention

Blog banner