wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security issues

profile
Khushi Shah
Jul 11, 2023
0 Likes
0 Discussions
25 Reads

An Operating system assigns a set of privileges to each process, determining the resources it can access. The highest level of privileges is administrative, supervisor, or root access, which grants root access to all functions and services of operating system. A key security issues in os design is to prevent or detect attempts by a user or malicious software (malware) from gaining unauthorised privileges on the system, particularly from gaining root access.

System access threats fall into general two categories:

Intruders and malicious software

Intruders or often outsiders. Intruder attacks range from benign to serious, with the goal of gaining access to a system or increasing the range of privileges accessible. Intruders can exploit system or software vulnerabilites such as buffer overflow or acquire protected information, such as user passwords. Malicious software or malware, is the most sophisticated type of threat to computer systems, involving bot application programs and utility program. Countermeasures are necessary to prevent these threats to insure the security of the operating system.

 


Comments ()


Sign in

Read Next

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Direct Memory Access

Blog banner

Modern Operating System

Blog banner

John Titor: The Time Traveler

Blog banner

Concurrency and Deadlocks

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Social Media Sentiment Analysis

Blog banner

IP ADDRESS

Blog banner

RAID and It's Levels

Blog banner

Broken Authentication Attacks

Blog banner

Whatsapp Messenger

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

M commerce

Blog banner

Artical on FreshBooks

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Optimization of operating system design

Blog banner

Artificial Intelligence (AI)

Blog banner

Proton mail

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Multithreading in Operating System

Blog banner

To-Do List In LISP

Blog banner

BITCOIN WALLET

Blog banner

I/O Buffering

Blog banner

Big Data

Blog banner

What is Virtual Memory

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

computer security

Blog banner

Ola

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Software

Blog banner

Random Forests

Blog banner

Internet of Things

Blog banner

K-means use cases

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Honeypot in cyber security

Blog banner

What is process

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Race Conditions

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner