


Angela V Rodrigues-53003220025
Sybscit-A
Security issues
Set of privileges is assigned to a process in an OS. These processes state the resources the process may be allowed to use for example the memory, privileged system instructions ETC. The highest level of privilege is called as supervisor, administrator or root access. The root access allows the process to use all the functions and services of the operating system. It is therefore important that while designing a operating system, it has to be made sure that it has the ability to detect malicious software or hacker trying to gain privileges on the system especially the root access.
System access threats
System access threats falls into 2 categories that is intruders and malicious software.
Intruders
Intruders are also commonly known as hacker or cracker which is one of the most threats to security. Intruders are classified into three types that is masquerader, misfeasor, clandestine user.
1)Masquerader: A person who is not authorised to use a computer but gains access to the system to misuse a legitimate users account.
2)Misfeasor:A legimate user who accesses resources that are not permitted to him or Is permitted access but misuses his or her privileges.
3)Clandestine user:An individual who gains access to the supervisory control of the system and uses it to avoid auditing an access control or to restrain audit collection.
Intruders can range between individuals that are simply curious about hacking but do not cause serious threats to the system and individuals that can access sensitive information or manipulate data or destroy a system which causes serious threats to the security of his system.Most intruders use system vulnerability i.e System weakness to gain access to an operating system.
Malicious software
Malicious software commonly referred to Malware, is perhaps the most advanced type of threat that exploit vulnerabilities Of a computing system. It does not possess a serious threat to computing system. Example of malware is virus, worms, logic bombs, backdoors etc.