L06 - IS - Operating System Security
L06 - IS - Operating System Security
website: https://www.javatpoint.com/operating-system-security
In this article, you will learn about operating system security with its issues and other features.
Security refers to providing safety for computer system resources like software, CPU, memory, disks, etc.
It can protect against all threats, including viruses and unauthorized access. It can be enforced by assuring
the operating system's integrity, confidentiality, and availability. If an illegal user runs a computer
application, the computer or data stored may be seriously damaged.
System security may be threatened through two violations, and these are as follows:
1. Threat
2. Attack
There are two types of security breaches that can harm the system: malicious and accidental. Malicious
threats are a type of destructive computer code or web script that is designed to cause system
vulnerabilities that lead to back doors and security breaches. On the other hand, Accidental Threats are
comparatively easier to protect against.
Security may be compromised through the breaches. Some of the breaches are as follows:
1. Breach of integrity
2. Theft of service
3. Breach of confidentiality
ADVERTISEMENT
ADVERTISEMENT
4. Breach of availability
5. Denial of service
ADVERTISEMENT
ADVERTISEMENT
It includes preventing legitimate use of the system. Some attacks may be accidental.
ADVERTISEMENT
ADVERTISEMENT
1. Integrity
Unauthorized users must not be allowed to access the system's objects, and users with insufficient rights
should not modify the system's critical files and resources.
2. Secrecy
The system's objects must only be available to a small number of authorized users. The system files should
not be accessible to everyone.
3. Availability
All system resources must be accessible to all authorized users, i.e., no single user/process should be able
to consume all system resources. If such a situation arises, service denial may occur. In this case, malware
may restrict system resources and preventing legitimate processes from accessing them.
Types of Threats
There are mainly two types of threats that occur. These are as follows:
Program threats
The operating system's processes and kernel carry out the specified task as directed. Program Threats
occur when a user program causes these processes to do malicious operations. The common example of
a program threat is that when a program is installed on a computer, it could store and transfer user
credentials to a hacker. There are various program threats. Some of them are as follows:
1.Virus
A virus may replicate itself on the system. Viruses are extremely dangerous and can modify/delete user
files as well as crash computers. A virus is a little piece of code that is implemented on the system program.
As the user interacts with the program, the virus becomes embedded in other files and programs,
potentially rendering the system inoperable.
2. Trojan Horse
This type of application captures user login credentials. It stores them to transfer them to a malicious user
who can then log in to the computer and access system resources.
3. Logic Bomb
A logic bomb is a situation in which software only misbehaves when particular criteria are met; otherwise,
it functions normally.
4. Trap Door
A trap door is when a program that is supposed to work as expected has a security weakness in its code
that allows it to do illegal actions without the user's knowledge.
System Threats
System threats are described as the misuse of system services and network connections to cause user
problems. These threats may be used to trigger the program threats over an entire network, known as
program attacks. System threats make an environment in which OS resources and user files may be
misused. There are various system threats. Some of them are as follows:
1. Port Scanning
It is a method by which the cracker determines the system's vulnerabilities for an attack. It is a fully
automated process that includes connecting to a specific port via TCP/IP. To protect the attacker's identity,
port scanning attacks are launched through Zombie Systems, which previously independent systems now
serve their owners while being utilized for such terrible purposes.
2. Worm
The worm is a process that can choke a system's performance by exhausting all system resources. A Worm
process makes several clones, each consuming system resources and preventing all other processes from
getting essential resources. Worm processes can even bring a network to a halt.
3. Denial of Service
Denial of service attacks usually prevents users from legitimately using the system. For example, if a
denial-of-service attack is executed against the browser's content settings, a user may be unable to access
the internet.
Malware
It contains viruses, worms, trojan horses, and other dangerous software. These are generally short code
snippets that may corrupt files, delete the data, replicate to propagate further, and even crash a system.
The malware frequently goes unnoticed by the victim user while criminals silently extract important data.
Network Intrusion
Network intruders are classified as masqueraders, misfeasors, and unauthorized users. A masquerader is
an unauthorized person who gains access to a system and uses an authorized person's account. A
misfeasor is a legitimate user who gains unauthorized access to and misuses programs, data, or resources.
A rogue user takes supervisory authority and tries to evade access constraints and audit collection.
Buffer Overflow
It is also known as buffer overrun. It is the most common and dangerous security issue of the operating
system. It is defined as a condition at an interface under which more input may be placed into a buffer
and a data holding area than the allotted capacity, and it may overwrite other information. Attackers use
such a situation to crash a system or insert specially created malware that allows them to take control of
the system.
Authentication
The process of identifying every system user and associating the programs executing with those users is
known as authentication. The operating system is responsible for implementing a security system that
ensures the authenticity of a user who is executing a specific program. In general, operating systems
identify and authenticate users in three ways.
1. Username/Password
Every user contains a unique username and password that should be input correctly before accessing a
system.
2. User Attribution
These techniques usually include biometric verification, such as fingerprints, retina scans, etc. This
authentication is based on user uniqueness and is compared to database samples already in the system.
Users can only allow access if there is a match.
ADVERTISEMENT
To login into the system, the user must punch a card into a card slot or enter a key produced by a key
generator into an option provided by the operating system.
1. Secret Key
The user is given a hardware device that can generate a secret id that is linked to the user's id. The system
prompts for such a secret id, which must be generated each time you log in.
2. Random numbers
Users are given cards that have alphabets and numbers printed on them. The system requests numbers
that correspond to a few alphabets chosen at random.
3. Network password
Some commercial applications issue one-time passwords to registered mobile/email addresses, which
must be input before logging in.
Firewalls
Firewalls are essential for monitoring all incoming and outgoing traffic. It imposes local security, defining
the traffic that may travel through it. Firewalls are an efficient way of protecting network systems or local
systems from any network-based security threat.
Physical Security
The most important method of maintaining operating system security is physical security. An attacker
with physical access to a system may edit, remove, or steal important files since operating system code
and configuration files are stored on the hard drive.
As OS security policies and procedures cover a large area, there are various techniques to addressing
them. Some of them are as follows:
OS security policies and procedures are developed and implemented to ensure that you must first
determine which assets, systems, hardware, and date are the most vital to your organization. Once that is
completed, a policy can be developed to secure and safeguard them properly.
website: https://www.geeksforgeeks.org/operating-system-security/
Network Intrusion
A system called an intrusion detection system (IDS) observes network traffic for malicious
transactions and sends immediate alerts when it is observed. It is software that checks a
network or system for malicious activities or policy violations. Each illegal activity or violation
is often recorded either centrally using a SIEM system or notified to an administration.
1. Program threats
Below are some program threats.
• Virus: A virus is a malicious executable code attached to another executable file. The
virus spreads when an infected file is passed from system to system. Viruses can be
harmless or they can modify or delete data. Opening a file can trigger a virus.
• Trojan Horse: A Trojan horse is malware that carries out malicious operations under the
2. System Threats
Below are some system threats.
• Worm: Worms replicate themselves on the system, attaching themselves to different files
and looking for pathways between computers, such as computer network that shares
common file storage areas.
• Denial of Service: Denial of Service (DoS) is a cyber-attack on an individual Computer or
Website with the intent to deny services to intended users. Their purpose is to disrupt an
organization’s network operations by denying access to its users.