wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Issues

profile
Angela Rodrigues
Jul 12, 2023
0 Likes
0 Discussions
24 Reads

Angela V Rodrigues-53003220025

Sybscit-A

Security issues

Set of privileges is assigned to a process in an OS. These processes state the resources the process may be allowed to use for example the memory, privileged system instructions ETC. The highest level of privilege is called as supervisor, administrator or root access. The root access allows the process to use all the functions and services of the operating system. It is therefore important that while designing a operating system, it has to be made sure that it has the ability to detect  malicious software or hacker trying to  gain privileges on the system especially the root access.

 

System access threats

 

 System access threats falls into 2 categories that is  intruders and malicious software.

 

Intruders

 

Intruders are also commonly known as hacker or cracker which is one of the most  threats to security. Intruders are classified into three types  that is masquerader,  misfeasor, clandestine user.

 

1)Masquerader: A person who is not authorised to use a computer but gains access to the system to misuse a legitimate users account.

 

2)Misfeasor:A legimate user who accesses resources that are not permitted to him or  Is permitted access but misuses his or her privileges.

 

3)Clandestine user:An individual who gains access to the supervisory control of the system and uses it to avoid auditing an access control or to restrain audit collection.

 

 Intruders can range between individuals that are simply curious about hacking but do not cause serious threats to the system and individuals that can access sensitive information or manipulate data or destroy a system which causes serious threats to the security of his system.Most intruders use system vulnerability i.e System weakness to gain access to an operating system.

 

Malicious software

 

Malicious software commonly referred to Malware, is perhaps the most advanced type of threat that exploit vulnerabilities Of a computing system. It does not possess a serious threat to computing system. Example of malware is virus, worms, logic bombs, backdoors etc.


Comments ()


Sign in

Read Next

virtual machine

Blog banner

Modern Operating Systems.

Blog banner

Operating system

Blog banner

Apple

Blog banner

What is a Dumpster Diving Attack?

Blog banner

To travel is to live

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

History of ITIL

Blog banner

MACHINE LEARNING

Blog banner

Cyber Forensics

Blog banner

Ethical Hacking

Blog banner

Data Mining

Blog banner

Challenges and risks in service operations

Blog banner

JIRA SOFTWARE

Blog banner

My favourite food

Blog banner

RAID

Blog banner

Consumer to consumer Business model

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Deadlock and Starvation

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Earth with no trees

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Bulk E-mail software

Blog banner

Self managing devices

Blog banner

Multiprocessor scheduling

Blog banner

IoT Evolution

Blog banner

On-Page SEO

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

Uniprocessor Scheduling

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

IO Buffers

Blog banner

Deadlocks in operating system

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

Deadlock and starvation in operating system

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner