wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Issues

profile
Angela Rodrigues
Jul 12, 2023
0 Likes
0 Discussions
25 Reads

Angela V Rodrigues-53003220025

Sybscit-A

Security issues

Set of privileges is assigned to a process in an OS. These processes state the resources the process may be allowed to use for example the memory, privileged system instructions ETC. The highest level of privilege is called as supervisor, administrator or root access. The root access allows the process to use all the functions and services of the operating system. It is therefore important that while designing a operating system, it has to be made sure that it has the ability to detect  malicious software or hacker trying to  gain privileges on the system especially the root access.

 

System access threats

 

 System access threats falls into 2 categories that is  intruders and malicious software.

 

Intruders

 

Intruders are also commonly known as hacker or cracker which is one of the most  threats to security. Intruders are classified into three types  that is masquerader,  misfeasor, clandestine user.

 

1)Masquerader: A person who is not authorised to use a computer but gains access to the system to misuse a legitimate users account.

 

2)Misfeasor:A legimate user who accesses resources that are not permitted to him or  Is permitted access but misuses his or her privileges.

 

3)Clandestine user:An individual who gains access to the supervisory control of the system and uses it to avoid auditing an access control or to restrain audit collection.

 

 Intruders can range between individuals that are simply curious about hacking but do not cause serious threats to the system and individuals that can access sensitive information or manipulate data or destroy a system which causes serious threats to the security of his system.Most intruders use system vulnerability i.e System weakness to gain access to an operating system.

 

Malicious software

 

Malicious software commonly referred to Malware, is perhaps the most advanced type of threat that exploit vulnerabilities Of a computing system. It does not possess a serious threat to computing system. Example of malware is virus, worms, logic bombs, backdoors etc.


Comments ()


Sign in

Read Next

Software

Blog banner

Importance of modern technology era

Blog banner

Scala - a programming tool

Blog banner

Key to success in Sports

Blog banner

This too shall pass

Blog banner

Vulnerability Assessment

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Student Grade Calculator in LISP

Blog banner

Predicting Student Performance with Data Science

Blog banner

Internet of Things

Blog banner

Computer Security

Blog banner

Security and E-mail

Blog banner

Twisted world

Blog banner

Artificial Intelligence and I

Blog banner

Memory Management in Operating System

Blog banner

Dangers of Using Public WiFis

Blog banner

Importance Of Blockchain

Blog banner

BharatPe

Blog banner

Models of Information Security.

Blog banner

Decision Tree: A Diagram Model

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Deadlock in Operating systems

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Deadlock

Blog banner

Modern Operating System - Khush bagaria

Blog banner

EMAIL INVESTIGATION

Blog banner

Fault Tolerance in an Operating System

Blog banner

Deadlocks

Blog banner

Subnet Masking

Blog banner

Operating system

Blog banner

Data carving - using hex editor

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Python as a tool for data analysis

Blog banner

Benefits and drawback of web security.

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Principles of Service Operation

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Design Considerations for Disk Cache Management

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Developments in Modern Operating Systems

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner