wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security issues

profile
Khushi Shah
Jul 11, 2023
0 Likes
0 Discussions
25 Reads

An Operating system assigns a set of privileges to each process, determining the resources it can access. The highest level of privileges is administrative, supervisor, or root access, which grants root access to all functions and services of operating system. A key security issues in os design is to prevent or detect attempts by a user or malicious software (malware) from gaining unauthorised privileges on the system, particularly from gaining root access.

System access threats fall into general two categories:

Intruders and malicious software

Intruders or often outsiders. Intruder attacks range from benign to serious, with the goal of gaining access to a system or increasing the range of privileges accessible. Intruders can exploit system or software vulnerabilites such as buffer overflow or acquire protected information, such as user passwords. Malicious software or malware, is the most sophisticated type of threat to computer systems, involving bot application programs and utility program. Countermeasures are necessary to prevent these threats to insure the security of the operating system.

 


Comments ()


Sign in

Read Next

Why we should do reading

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Indian Culture and Tradition

Blog banner

How to grow followers on Instagram business account?

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

A Heartfelt Act of Kindness

Blog banner

What is Segmentation?

Blog banner

OS Assignment 3 Deadlock

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Loneliness

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Business Intelligence v/s Big Data

Blog banner

Types of Viruses

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Have You Explored India Yet?

Blog banner

Deadlock and Starvation

Blog banner

virtual memory

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

THREADS (assignment 1)

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Os Virtual Memory

Blog banner

Virtual Memory

Blog banner

IT Service Continuity Management

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

The most common internet security threats

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Cyber Security in Data Breaching

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Sweet Mango Murabba

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Cache Memory

Blog banner

Impact of social media on the human life

Blog banner

Virtual Memory

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Top 10 Logos and their meanings

Blog banner

Smart Homes | Zigbee Alliance

Blog banner