wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security issues

profile
Khushi Shah
Jul 11, 2023
0 Likes
0 Discussions
24 Reads

An Operating system assigns a set of privileges to each process, determining the resources it can access. The highest level of privileges is administrative, supervisor, or root access, which grants root access to all functions and services of operating system. A key security issues in os design is to prevent or detect attempts by a user or malicious software (malware) from gaining unauthorised privileges on the system, particularly from gaining root access.

System access threats fall into general two categories:

Intruders and malicious software

Intruders or often outsiders. Intruder attacks range from benign to serious, with the goal of gaining access to a system or increasing the range of privileges accessible. Intruders can exploit system or software vulnerabilites such as buffer overflow or acquire protected information, such as user passwords. Malicious software or malware, is the most sophisticated type of threat to computer systems, involving bot application programs and utility program. Countermeasures are necessary to prevent these threats to insure the security of the operating system.

 


Comments ()


Sign in

Read Next

TAILS OS

Blog banner

Objectives and functions of Operating System...

Blog banner

SPAM

Blog banner

Session Hijacking

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Pink sauce pasta

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Social Engineering

Blog banner

Trello ( management software)

Blog banner

Multicore and Multithreading

Blog banner

What is a Malware ?

Blog banner

Interesting fact about kangaroo.

Blog banner

GIS in Disaster Management

Blog banner

Memory Management in Operating System

Blog banner

Virtual Machine

Blog banner

What are NFT s?

Blog banner

c

Blog banner

Reconnaissance

Blog banner

Guidelines for a low sodium diet.

Blog banner

IoT Evolution

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Women empowerment

Blog banner

Types of threads

Blog banner

Strengthening Active Directory Security

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

File sharing

Blog banner

Environmental Management using GIS

Blog banner

I/O Buffering

Blog banner

Evolution of operating systems

Blog banner

Why Data Security Is Important

Blog banner

Modern operating system

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Product Discount Calculator

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Cache memory

Blog banner

Inventory management software system

Blog banner

Memory Management

Blog banner