wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security issues

profile
Khushi Shah
Jul 11, 2023
0 Likes
0 Discussions
24 Reads

An Operating system assigns a set of privileges to each process, determining the resources it can access. The highest level of privileges is administrative, supervisor, or root access, which grants root access to all functions and services of operating system. A key security issues in os design is to prevent or detect attempts by a user or malicious software (malware) from gaining unauthorised privileges on the system, particularly from gaining root access.

System access threats fall into general two categories:

Intruders and malicious software

Intruders or often outsiders. Intruder attacks range from benign to serious, with the goal of gaining access to a system or increasing the range of privileges accessible. Intruders can exploit system or software vulnerabilites such as buffer overflow or acquire protected information, such as user passwords. Malicious software or malware, is the most sophisticated type of threat to computer systems, involving bot application programs and utility program. Countermeasures are necessary to prevent these threats to insure the security of the operating system.

 


Comments ()


Sign in

Read Next

Virtual memory in Operating System

Blog banner

Hosting basics

Blog banner

Memory Management in Operating System

Blog banner

Threads in OS

Blog banner

Define Instagram.

Blog banner

Virtual memory in os

Blog banner

Life lesson

Blog banner

SQL Injection

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

HOW A CENTRAL PROCESSING UNIT (CPU) WORKS?

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Microsoft Windows Overview

Blog banner

Blockchain technology: security risk and prevention

Blog banner

How to lose belly fat

Blog banner

Data Science & AI

Blog banner

What is OS and its overview

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Which is a good bike to buy?

Blog banner

Escape

Blog banner

Best password managers: Reviews of the top products

Blog banner

Operating Systems

Blog banner

Memory Management

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Ethical Hacking

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Friendship

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Google classroom

Blog banner

Paralysis/Paralysis Stroke

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Starting Android Activity Using Intent

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Big Data Architecture

Blog banner

Uber

Blog banner

Uniprocessor scheduling

Blog banner

GIS

Blog banner