wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security issues

profile
Khushi Shah
Jul 11, 2023
0 Likes
0 Discussions
24 Reads

An Operating system assigns a set of privileges to each process, determining the resources it can access. The highest level of privileges is administrative, supervisor, or root access, which grants root access to all functions and services of operating system. A key security issues in os design is to prevent or detect attempts by a user or malicious software (malware) from gaining unauthorised privileges on the system, particularly from gaining root access.

System access threats fall into general two categories:

Intruders and malicious software

Intruders or often outsiders. Intruder attacks range from benign to serious, with the goal of gaining access to a system or increasing the range of privileges accessible. Intruders can exploit system or software vulnerabilites such as buffer overflow or acquire protected information, such as user passwords. Malicious software or malware, is the most sophisticated type of threat to computer systems, involving bot application programs and utility program. Countermeasures are necessary to prevent these threats to insure the security of the operating system.

 


Comments ()


Sign in

Read Next

Memory Management in Operating System

Blog banner

Service Design Model

Blog banner

OS Assignment 1

Blog banner

Rain bow

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

MODERN OPERATING SYSTEM

Blog banner

What is process

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

BENIFITS OF YOGA

Blog banner

Memory input output management

Blog banner

Direct memory access

Blog banner

Modern Operating Systems.

Blog banner

What are NFT s?

Blog banner

Deadlock

Blog banner

What is Vishing?

Blog banner

virtual machine

Blog banner

Note on Process, Process creation and Process termination

Blog banner

The War With Cold On Earth

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Big Data Architecture

Blog banner

HACKING MOBILE PLATFORM

Blog banner

american greatines

Blog banner

Data Science in Mental Health Prediction

Blog banner

MPL and how its effects?

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

WomenEmpowerment

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

A BLOG ON MYSQL

Blog banner

GUIDE TO GIS

Blog banner

Security Issues and Countermeasures

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Operating Systems

Blog banner

Real Time Scheduling

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Lucidchart

Blog banner

Mobile Security

Blog banner

What are Virtual Machines

Blog banner

File Management In OS

Blog banner