wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security issues

profile
Khushi Shah
Jul 11, 2023
0 Likes
0 Discussions
25 Reads

An Operating system assigns a set of privileges to each process, determining the resources it can access. The highest level of privileges is administrative, supervisor, or root access, which grants root access to all functions and services of operating system. A key security issues in os design is to prevent or detect attempts by a user or malicious software (malware) from gaining unauthorised privileges on the system, particularly from gaining root access.

System access threats fall into general two categories:

Intruders and malicious software

Intruders or often outsiders. Intruder attacks range from benign to serious, with the goal of gaining access to a system or increasing the range of privileges accessible. Intruders can exploit system or software vulnerabilites such as buffer overflow or acquire protected information, such as user passwords. Malicious software or malware, is the most sophisticated type of threat to computer systems, involving bot application programs and utility program. Countermeasures are necessary to prevent these threats to insure the security of the operating system.

 


Comments ()


Sign in

Read Next

Education: Key to your Prosperity

Blog banner

Information of meesho company

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Virtual memory in Operating System

Blog banner

SQL Injection practice on DVWA

Blog banner

Puri Jagannath temple

Blog banner

The Five Steps of Data Science

Blog banner

Components of GIS

Blog banner

All you need to know about Cassandra

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Royal enfield

Blog banner

Blog on health and fitness

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

CyberSecurity Color Wheel

Blog banner

Define Instagram.

Blog banner

SECURITY TOOLS

Blog banner

SESSION HIJACKING

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

An Overview of Virtual Machines

Blog banner

Starting Android Activity Using Intent

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Data Mapping

Blog banner

1.1 basic elements

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Scala - a programming tool

Blog banner

Danger assessment in GIS

Blog banner

Difference Between Classification And Clustering

Blog banner

Article on different management system

Blog banner

Cache memory

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Sessions In OS.

Blog banner

MySQL

Blog banner

Cache Memory(142)

Blog banner

Virtual memory

Blog banner

Cyber Security Control

Blog banner

10 Survival Tips that might save your life

Blog banner

Modern Operating System

Blog banner

Logical and physical address

Blog banner