wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security issues

profile
Khushi Shah
Jul 11, 2023
0 Likes
0 Discussions
25 Reads

An Operating system assigns a set of privileges to each process, determining the resources it can access. The highest level of privileges is administrative, supervisor, or root access, which grants root access to all functions and services of operating system. A key security issues in os design is to prevent or detect attempts by a user or malicious software (malware) from gaining unauthorised privileges on the system, particularly from gaining root access.

System access threats fall into general two categories:

Intruders and malicious software

Intruders or often outsiders. Intruder attacks range from benign to serious, with the goal of gaining access to a system or increasing the range of privileges accessible. Intruders can exploit system or software vulnerabilites such as buffer overflow or acquire protected information, such as user passwords. Malicious software or malware, is the most sophisticated type of threat to computer systems, involving bot application programs and utility program. Countermeasures are necessary to prevent these threats to insure the security of the operating system.

 


Comments ()


Sign in

Read Next

Paginng In OS

Blog banner

NIKE

Blog banner

c

Blog banner

geographic information system (GIS)

Blog banner

12 Principles of Animation

Blog banner

Full Disk Encryption

Blog banner

Memory input output management

Blog banner

Proof-of-Stake (PoS)

Blog banner

Importance of self defence for girls

Blog banner

Random Forests

Blog banner

DATA VAULT

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Memory management

Blog banner

Consumer to consumer Business model

Blog banner

Memory Management

Blog banner

Cache Memory

Blog banner

OS assignment 3

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Constrains in service design

Blog banner

Wedding photographer

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

File management

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

File Sharing

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Fitness regime by Deepesh

Blog banner

SQL Injection

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

10 Interesting Facts about Death Note

Blog banner

Fitness

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Facebook marketing

Blog banner

Not anti-social, but pro-solitude

Blog banner

Multicore and multithreading 171

Blog banner

Assignment-3

Blog banner

Art and Culture of Rajasthan

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Understanding E-mail Servers

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Evolution of Operating Sytems

Blog banner

A MODERN OPERATING SYSTEM

Blog banner