wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Issues

profile
Angela Rodrigues
Jul 12, 2023
0 Likes
0 Discussions
24 Reads

Angela V Rodrigues-53003220025

Sybscit-A

Security issues

Set of privileges is assigned to a process in an OS. These processes state the resources the process may be allowed to use for example the memory, privileged system instructions ETC. The highest level of privilege is called as supervisor, administrator or root access. The root access allows the process to use all the functions and services of the operating system. It is therefore important that while designing a operating system, it has to be made sure that it has the ability to detect  malicious software or hacker trying to  gain privileges on the system especially the root access.

 

System access threats

 

 System access threats falls into 2 categories that is  intruders and malicious software.

 

Intruders

 

Intruders are also commonly known as hacker or cracker which is one of the most  threats to security. Intruders are classified into three types  that is masquerader,  misfeasor, clandestine user.

 

1)Masquerader: A person who is not authorised to use a computer but gains access to the system to misuse a legitimate users account.

 

2)Misfeasor:A legimate user who accesses resources that are not permitted to him or  Is permitted access but misuses his or her privileges.

 

3)Clandestine user:An individual who gains access to the supervisory control of the system and uses it to avoid auditing an access control or to restrain audit collection.

 

 Intruders can range between individuals that are simply curious about hacking but do not cause serious threats to the system and individuals that can access sensitive information or manipulate data or destroy a system which causes serious threats to the security of his system.Most intruders use system vulnerability i.e System weakness to gain access to an operating system.

 

Malicious software

 

Malicious software commonly referred to Malware, is perhaps the most advanced type of threat that exploit vulnerabilities Of a computing system. It does not possess a serious threat to computing system. Example of malware is virus, worms, logic bombs, backdoors etc.


Comments ()


Sign in

Read Next

Philadelphia Experiment : Was it real?

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

FILE SHARING

Blog banner

All you need to know about “Off-page SEO”

Blog banner

What is a Malware ?

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Threads

Blog banner

Python as a tool for Data science task & project

Blog banner

Lifestyle of a photographer

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Security issues

Blog banner

Multicore CPUs

Blog banner

Consumer to consumer business mode

Blog banner

Virtual machine

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Memory Management - operating system

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Telegram and it's features

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Evolution of Operating System

Blog banner

Modern Operating system

Blog banner

Spyware

Blog banner

All you need to know about “On-page SEO”

Blog banner

Culture Of Ladakh

Blog banner

STARVATION

Blog banner

Go Daddy

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

What are NFT s?

Blog banner

Paging

Blog banner

Deadlock

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Memory management

Blog banner

Principal of concurrency

Blog banner

Ubiquitous Computing

Blog banner

DURGA POOJA

Blog banner

Ethical Hacking

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Virtual machine and virtualizing

Blog banner

Process Creation

Blog banner