wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Issues

profile
Angela Rodrigues
Jul 12, 2023
0 Likes
0 Discussions
24 Reads

Angela V Rodrigues-53003220025

Sybscit-A

Security issues

Set of privileges is assigned to a process in an OS. These processes state the resources the process may be allowed to use for example the memory, privileged system instructions ETC. The highest level of privilege is called as supervisor, administrator or root access. The root access allows the process to use all the functions and services of the operating system. It is therefore important that while designing a operating system, it has to be made sure that it has the ability to detect  malicious software or hacker trying to  gain privileges on the system especially the root access.

 

System access threats

 

 System access threats falls into 2 categories that is  intruders and malicious software.

 

Intruders

 

Intruders are also commonly known as hacker or cracker which is one of the most  threats to security. Intruders are classified into three types  that is masquerader,  misfeasor, clandestine user.

 

1)Masquerader: A person who is not authorised to use a computer but gains access to the system to misuse a legitimate users account.

 

2)Misfeasor:A legimate user who accesses resources that are not permitted to him or  Is permitted access but misuses his or her privileges.

 

3)Clandestine user:An individual who gains access to the supervisory control of the system and uses it to avoid auditing an access control or to restrain audit collection.

 

 Intruders can range between individuals that are simply curious about hacking but do not cause serious threats to the system and individuals that can access sensitive information or manipulate data or destroy a system which causes serious threats to the security of his system.Most intruders use system vulnerability i.e System weakness to gain access to an operating system.

 

Malicious software

 

Malicious software commonly referred to Malware, is perhaps the most advanced type of threat that exploit vulnerabilities Of a computing system. It does not possess a serious threat to computing system. Example of malware is virus, worms, logic bombs, backdoors etc.


Comments ()


Sign in

Read Next

Memory Management

Blog banner

Phishing

Blog banner

Water Resources are about to exhaust...

Blog banner

Mariana Trench: The deepest depths

Blog banner

MODERN OPERATING SYSTEM

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Electronic Funds Transfer

Blog banner

The evolution of OS

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Deadlock

Blog banner

Different types of scam frauds

Blog banner

SPEM

Blog banner

Depression

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Consumer to consumer Business model

Blog banner

M commerce

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Deadlock in Operating systems

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Data Analytics in Data Science

Blog banner

Deadlock in operating system

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

INTERRUPTS

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

PODIO

Blog banner

Dekkers Algorithm

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

bulk email software

Blog banner

What is thread and multithreading ?

Blog banner

Starvation

Blog banner

Linux VServer Architecture

Blog banner

Environmental Management using GIS

Blog banner

Having passion in life

Blog banner

Memory Hierarchy

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner