wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security issues

profile
Khushi Shah
Jul 11, 2023
0 Likes
0 Discussions
24 Reads

An Operating system assigns a set of privileges to each process, determining the resources it can access. The highest level of privileges is administrative, supervisor, or root access, which grants root access to all functions and services of operating system. A key security issues in os design is to prevent or detect attempts by a user or malicious software (malware) from gaining unauthorised privileges on the system, particularly from gaining root access.

System access threats fall into general two categories:

Intruders and malicious software

Intruders or often outsiders. Intruder attacks range from benign to serious, with the goal of gaining access to a system or increasing the range of privileges accessible. Intruders can exploit system or software vulnerabilites such as buffer overflow or acquire protected information, such as user passwords. Malicious software or malware, is the most sophisticated type of threat to computer systems, involving bot application programs and utility program. Countermeasures are necessary to prevent these threats to insure the security of the operating system.

 


Comments ()


Sign in

Read Next

5 ways to save money on catering services in Mumbai

Blog banner

gis substation

Blog banner

child Labour

Blog banner

Big Data Architecture

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Hacking Mobile Platforms

Blog banner

Types Of scheduling

Blog banner

Uniprocessor Scheduling

Blog banner

INTERNET

Blog banner

Pipedrive

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Evolution of the Microprocesor

Blog banner

INTRODUCTION

Blog banner

Creating Digitally Signed Document

Blog banner

Deadlock

Blog banner

Deadlock and Starvation

Blog banner

Note Taker App

Blog banner

Outlook.com

Blog banner

Deadlock

Blog banner

FIREWALL

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

The Golden Temple , Amritsar

Blog banner

Functions of Operating System

Blog banner

Marvel Cinematic Universe

Blog banner

Computer security techniques

Blog banner

Swiggi

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Direct Memory Access

Blog banner

Memory management

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

therapist blog

Blog banner

Dangers of Using Public WiFis

Blog banner

MPL and how its effects?

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Know your Processors!

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

PPT methodology

Blog banner

Data Warehouse Bus Matrix

Blog banner

HTML vs HTML5

Blog banner

Traditional Unix System

Blog banner