wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security issues

profile
Khushi Shah
Jul 11, 2023
0 Likes
0 Discussions
25 Reads

An Operating system assigns a set of privileges to each process, determining the resources it can access. The highest level of privileges is administrative, supervisor, or root access, which grants root access to all functions and services of operating system. A key security issues in os design is to prevent or detect attempts by a user or malicious software (malware) from gaining unauthorised privileges on the system, particularly from gaining root access.

System access threats fall into general two categories:

Intruders and malicious software

Intruders or often outsiders. Intruder attacks range from benign to serious, with the goal of gaining access to a system or increasing the range of privileges accessible. Intruders can exploit system or software vulnerabilites such as buffer overflow or acquire protected information, such as user passwords. Malicious software or malware, is the most sophisticated type of threat to computer systems, involving bot application programs and utility program. Countermeasures are necessary to prevent these threats to insure the security of the operating system.

 


Comments ()


Sign in

Read Next

Linker

Blog banner

Interrupts - Types, Working & Importance

Blog banner

security requirements for safe e-payment

Blog banner

Importance of Network Security Risk

Blog banner

Deadlock

Blog banner

Routers

Blog banner

Modern operating system

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

PHISHING

Blog banner

Why is online marketing is important in current scenario

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

PODIO

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Different types of scam Fraud

Blog banner

MUTUAL EXCLUSION

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Memory heirchy

Blog banner

THREADS (assignment 1)

Blog banner

Password Generator - Lisp

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

What is Data, Information and Knowledge?

Blog banner

De-Coding Love

Blog banner

USPS mail

Blog banner

A small world of Sockets

Blog banner

Types of Malware in Cyber Security

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Consumer to consumer business mode

Blog banner

Have You Explored India Yet?

Blog banner

1.1 basic elements

Blog banner

RAID

Blog banner

Metasploit

Blog banner

LinkedIn

Blog banner

Disk scheduling

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Types of email

Blog banner

John Titor: The Time Traveler

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Article on IT development trends

Blog banner