Operating System Security
Operating System Security
5. Worm:
A computer worm is a type of malware that replicates itself and infects
other computers while remaining active on affected systems. A computer
worm replicates itself in order to infect machines that aren’t already
infested. It frequently accomplishes this by taking advantage of
components of an operating system that are automatic and unnoticed by
the user. Worms are frequently overlooked until their uncontrolled
replication depletes system resources, slowing or stopping other
activities.
3. Denial of Service:
Such attacks aren’t aimed for the purpose of collecting information or
destroying system files. Rather, they are used for disrupting the legitimate
use of a system or facility.
These attacks are generally network-based. They fall into two categories:
– Attacks in this first category use so many system resources that no useful
work can be performed.
For example, downloading a file from a website that proceeds to use all
available CPU time.
– Attacks in the second category involve disrupting the network of the facility.
These attacks are a result of the abuse of some fundamental TCP/IP
principles.
the fundamental functionality of TCP/IP.
Security Measures Taken –
To protect the system, Security measures can be taken at the following
levels:
Physical:
The sites containing computer systems must be physically secured
against armed and malicious intruders. The workstations must be
carefully protected.
Human:
Only appropriate users must have the authorization to access the system.
Phishing(collecting confidential information) and Dumpster
Diving(collecting basic information so as to gain unauthorized access)
must be avoided.
Operating system:
The system must protect itself from accidental or purposeful security
breaches.
Networking System:
Almost all of the information is shared between different systems via a
network. Intercepting these data could be just as harmful as breaking into
a computer. Henceforth, Network should be properly secured against
such attacks.
Usually, Anti Malware programs are used to periodically detect and remove
such viruses and threats. Additionally, to protect the system from Network
Threats, a Firewall is also be used.