0% found this document useful (0 votes)
8 views9 pages

CSC205 Session 03

Sweet

Uploaded by

markwilliamx16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views9 pages

CSC205 Session 03

Sweet

Uploaded by

markwilliamx16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CSC205: OPERATING SYSTEM

SESSSION 3: OPERATING SYSTEMS SECURITY/MECHANISMS, NETWORKING


AND WINDOWS

Operating System Security

Security refers to providing a protection system to computer system resources such as CPU,
memory, disk, software programs and most importantly data/information stored in the computer
system. If a computer program is run by an unauthorized user, then he/she may cause severe
damage to computer or data stored in it. Therefore, Operating System Security refers to practices
and measures that can ensure the confidentiality, integrity, and availability (CIA) of operating
systems. The goal of OS security is to protect the OS from various threats, including malicious
software such as worms, trojans and other viruses, misconfigurations, and remote intrusions. OS
security typically involves the implementation of control techniques that can protect your assets
from unauthorized modification and deletion or theft. The most common techniques used to protect
operating systems include the use of antivirus software and other endpoint protection measures,
regular OS patch updates, a firewall for monitoring network traffic, and enforcement of secure
access through least privileges and user controls. There are two main common types of OS security
threats namely Program and System threats, discussed as follows;

Program Threats
Operating system’s processes and kernel do the designated task as instructed. If a user program
made these process do malicious tasks, then it is known as Program Threats. One of the common
examples of program threat is a program installed in a computer which can store and send user
credentials via network to some hacker. Following is the list of some well-known program threats.

Malware: Malware is short for malicious software, which encompasses a range of attack vectors
such as viruses, worms, trojans, and rootkits. Malware is injected into a system without the owner’s
consent, or by masquerading as legitimate software, with the objective of stealing, destroying or
corrupting data, or compromising the device. Malware can also replicate, allowing it to spread
further in a corporate network and beyond. Malware attacks often go undetected by the target user,
allowing for the quiet extraction of sensitive data.

Page 1 of 9
Network Intrusion: Network intrusion occurs when an individual gains access to a system for
improper use. There are several types of network intrusion depending on the type of intruder:
 Careless insiders—authorized users who neglect to follow security policies or best
practices, causing exposure of sensitive assets.
 Malicious insiders—authorized users who misuse their privileges for malicious indigence.
 Masqueraders—external individuals who pose as legitimate users, exploiting the account
or credentials of an authorized user to gain access to the system.
 Clandestine users—attackers who penetrate the system by gaining supervisory control and
going around access controls.
Buffer Overflow: The main function of a buffer is to temporarily store data. Each buffer has a
capacity of data it can hold. During a buffer overflow attack, the buffer or other temporary data
stores are overflowing with data. When the buffer overflows, the program attempting to write the
data may overwrite other memory locations containing important information. Threat actors look
for buffer overflow vulnerabilities, which they can exploit to inject scripts that help them hijack
the system or crash it.

System Threats
System threats refers to misuse of system services and network connections to put user in trouble.
System threats can be used to launch program threats on a complete network called as program
attack. System threats creates such an environment that operating system resources/ user files are
misused. Following is the list of some well-known system threats.
 Worm − Worm is a process which can choked down a system performance by using system
resources to extreme levels. A Worm process generates its multiple copies where each copy
uses system resources, prevents all other processes to get required resources. Worms
processes can even shut down an entire network.
 Port Scanning − Port scanning is a mechanism or means by which a hacker can detects
system vulnerabilities to make an attack on the system.
 Denial of Service Attacks: A Denial of Service (DoS) attack is intended to clog a system
with fake requests so it becomes overloaded, and eventually stops serving legitimate
requests. Some DoS attacks, in addition to overwhelming a system’s resources, can cause
damage to the underlying infrastructure. Modern DoS attacks are waged by a distributed

Page 2 of 9
network of thousands or millions of bots (automated agents)—this is known as distributed
denial of service (DDoS), and can be extremely difficult to mitigate due to its huge scale.
An example of a DoS attack is the repeated use of system requests in a tight loop, or a “syn
flood” in which the attacker sends a large number of network requests, requiring the server
to acknowledge each one, and exhausting its resources.

OS Security Techniques
There three main types of protective measures deployed by OS for security purpose which includes
Authentication, One-Time Password and Visualization.
Authentication: Authentication involves matching an identified user with the programs or data
they are allowed to access. All operating systems have controls that can be used to verify that users
who run a particular program are authorized to do so.
You can use the following techniques to authenticate users at the operating system level:
 Security keys: keys are provided by a key generator, usually in the form of a physical
dongle. The user must insert the key into a slot in the machine to log in.
o Username-password combinations: The user enters a username that is registered
with the OS, along with a matching password.
o Biometric signatures: The user scans a physical attribute, such as a fingerprint or
retina, to identify themselves.
o Multi-factor authentication: Modern authentication systems use multiple methods
to identify a user, combining something the user knows (credentials), something
they own (such as a mobile device), and/or a physical characteristic (biometrics).

Using One-Time Passwords: One-time passwords offer an additional layer of security when
combined with standard authentication measures. Users must enter a unique password generated
each time they log in to the system. A one-time password cannot be reused. For instance, one-time
passwords include:
 Network passwords: An application sends a one-time password to the users via a registered
email address or mobile phone number. The user must enter this password to log in to the
computer.

Page 3 of 9
 Random numbers: The user receives a card with listing numbers that correspond to
matching letters. The OS requires the user to enter the numbers that match a set of randomly
generated letters.
 Secret keys: The user receives a device that generates secret keys. The user then enters the
secret key into the OS system, which identifies the user credentials associated with the key.
One-time password is implemented in various ways.
 Random numbers − Users are provided cards having numbers printed along with
corresponding alphabets. System asks for numbers corresponding to few alphabets
randomly chosen.
 Secret key − User are provided a hardware device which can create a secret id mapped
with user id. System asks for such secret id which is to be generated every time prior to
login.
 Network password − Some commercial applications send one-time passwords to user on
registered mobile/ email which is required to be entered prior to login.

Virtualization
Virtualization enables you to abstract software from hardware, effectively separating the two. The
main advantage of virtualization is that it introduces a high level of efficiency and flexibility, while
providing greater security coverage. There are many types of virtualizations, including desktop,
application, network, server, network, storage, and OS virtualization. Therefore, OS virtualization
enables you to multiple isolated user environments using the same OS kernel. The technology that
creates and enables this type of isolation is called a “hypervisor”, which serves as a layer located
between the device and the virtualized resources. The hypervisor manages the virtual machines
(VM) running on the device (typically 2-3 Vms). Each VM is used for each user or each security
zone.
Advantages of OS virtualization
Each type of VM is limited to the actions allowed by design. Any further action is restricted. This
keeps the environment secure. The hypervisor runs below the OS of the device and splits the device
into multiple VMs running locally with their own OS—effectively isolating users.
Because the users are isolated, the devices remain secure. This ensures that employees and third
parties can gain access to company resources without endangering company resources.

Page 4 of 9
Another major advantage of OS virtualization is that none of the virtualized environments can
directly access the network. Instead, connectivity is enabled via an invisible, virtualized network
layer that implements network segmentation directly on the endpoint device.

Network Operating System


The network OS is an OS that operates on the server. It helps to enable the server to handle data,
groups, users, and security and offers various features to the connected devices. It is sometimes
known as a server operating system. The primary goal of using a network OS is to enable devices
to share data and access resources like printers through a LAN, a private network, and other
networks. Network OS include Microsoft Windows Server 2003, 2008, UNIX, and Linux.
It makes the server more safe, secure, and stable. The network operating system implements many
protocols via the network and ensures that network functionalities are properly implemented. One
disadvantage of the network operating system is that it is tightly connected to the network.
Integrating the latest technologies and hardware into the computer system is also simpler.
However, these types of operating systems are very expensive and need constant maintenance and
updating.
Advantages and Disadvantages of Network Operating System
There are various advantages and disadvantages of a network OS. Some of the advantages and
disadvantages are as follows:
Advantages
1. It has highly stable and centralized servers.
2. Its security concerns are handled by the servers.
3. It is easily adaptable to new technologies, upgrades, and hardware.
Disadvantages
1. The cost of network operating systems is relatively high.
2. It requires regular maintenance and updates.

Differences between Standalone and Network Operating System

Features Standalone operating system Network operating system


It is an OS that operates on
It is an OS that runs on connected devices and
Definition desktop systems and other
provides network-based functionality.
portable devices.

Page 5 of 9
It enables a single user to control
It enables users to manage data, users, groups,
Functionality and acquire services from the
and other network-related functions.
device at the same time.
Some examples of the standalone Some examples of the network OS are
OS are DOS, Windows 95, Mac Microsoft Windows Server 2003, UNIX,
Examples
OS, and Windows 2000 Linux, Novell NetWare, Microsoft Windows
professionals. Server 2008, Mac OS X, and BSD.

Windows
Windows is a graphical operating system developed by Microsoft. It allows users to view and store
files, run the software, play games, watch videos, and provides a way to connect to the internet. It
was released for both home computing and professional works. Microsoft introduced the first
version as 1.0 It was released for both home computing and professional functions of Windows on
10 November 1983. Later, it was released on many versions of Windows as well as the current
version, Windows 10. In 1993, the first business-oriented version of Windows was released, which
is known as Windows NT 3.1. Then it introduced the next versions, Windows 3.5, 4/0, and
Windows 2000. When the XP Windows was released by Microsoft in 2001, the company designed
its various versions for a personal and business environment. It was designed based on standard
x86 hardware, like Intel and AMD processor. Accordingly, it can run on different brands of
hardware, such as HP, Dell, and Sony computers, including home-built PCs.
History of Microsoft Windows
Since 1983, Microsoft is producing Windows. The founder of Microsoft 'Bill Gates' announced
for Microsoft Windows on 10 November 1983 and released the first version of Windows in
1985. The following table contains history of Windows from edition 1 to 10.

Version History
Microsoft introduced Windows with its first version 1.0. It was released on 20
Windows November 1985, and at the beginning, it was sold for $100.00. Additionally, it
1.0 was the first effort by Microsoft to produce a graphical user interface in 16-
bit.
The second version, Windows 2.0, was produced by Microsoft on 9 December
1987 as well as it also introduced the Window 386 on the same day. Initially, the
price was the same $100.00 for both of the Windows in the market.
Windows
It came with new features such as it was able to overlap each other, and it also
2.0
introduced the new way to maximize and minimize the window, instead of using
'zooming' and 'iconizing' respectively.
Furthermore, it also included the control panel feature where several system

Page 6 of 9
settings and configuration options are available in one place. Even Microsoft Word
and Excel were also used for the first time on Windows 2.
Windows
It was released in June 1988, and at the beginning, its price was $100.00.
286
It was the first Windows that needed a hard drive. It was launched by Microsoft on
22 May 1990. Its full version was sold for $149.95, and the updated version was
$79.95. Additionally, the multimedia supported Windows 3 was introduced in
October 1991.
Windows Windows version 3.0 gained more success, and it became a challenge for Apple's
3.0 Macintosh and the Commodore Amiga GUI as it was provided pre-installed on
computers by PC compatible manufacturers as well as Zenith Data Systems.
It was also able to run the MS-DOS program in Windows that allowed multitasking
in legacy programs as well as supported 256 colors, which made the interface more
colorful and advanced.
It was launched in April 1992, when it was in development its code name was
Sparta. It was the commonly used operating system for the PC graphical user
interface. In the first two months after its release, more than one million copies
were sold. It made the Windows usable publishing platform for the first time by
introducing the TrueType fonts. Minesweeper was also used for the first time on
the Windows 3.1.
It was needed only 1MB of RAM to run, and it allowed users to control the MS-
DOS programs with the help of a mouse for the first time. Furthermore, it was also
Windows
the first operating system to be distributed on a CD-ROM.
3.1
Some other generations of version 3.1 are as follows:
 In 1992, the Windows for Workgroups 3.1 was launched.
 Microsoft introduced Windows NT 3.1 on 27 July 1993.
 An updated version of Windows 3.1, Windows 3.11, was introduced on 31
December 1993.
 In February 1994, the Windows for Workgroups 3.11 was launched.
 On 21 September 1994, the Windows NT 5 was introduced.
 The next version Windows NT 3.51, was introduced on 30 May 1995.
As the name specifies, Windows 95 was launched on 24 August 1995, and within
four days of its release, more than one million copies were sold. It introduced the
Start button and Start menu features for the first time, including important features
such as a 32-bit environment, multitasking, and taskbar. Furthermore, MS-DOS
Windows 95 still played a vital role in Windows 95, with the help of some programs and
elements.
Internet Explorer was also used on the Windows 95 for the first time, but it could
not be installed by default, it needed the Windows 95 plus pack for it. Later,
Windows 95 improved and included the IE browser by default.
Windows 95
Service It was introduced on 24 February 1996.
Pack
Windows
On 29 July 1996, Windows NT 4.0 was launched.
NT 4.0

Page 7 of 9
 The first version 0 of Windows CE was introduced in November 1996.
Windows  The Second version 0 of Windows CE was launched in November 1997.
CE  The next version 1 of Windows CE was released in July 1998.
 The third version, 3.0 of Windows CE, was introduced in 1999.
It was developed on Windows 95, and introduced in June 1998. It was released,
including Internet Explorer 4, Windows Address Book, Outlook Express,
Microsoft Chat, and NetShow Player.
The second version of Windows 98 was introduced on 5 May 1999, in this version
the NetShow Player was replaced by Windows Media Player 6.2. It was also
Windows 98 brought with the address bar and back/forward navigation buttons in Windows
Explorer, and more other features.
Windows 98 came with the new feature Windows Driver model for computer
components and accessories, which offered support to all future editions of
Windows. Furthermore, it was improved USB support including USB mice and
USB hubs.
Windows
On 17 February 2000, it was launched.
2000
It was invented in September 2000, and it was the last operating system, which
was based on MS-DOS and in the Windows 9x line. According to the enterprise
market, it was considered consumer-aimed Windows with the Windows 2000. It
Windows
was also provided some useful features for consumers as well as more automated
ME
system recovery tools.
Additionally, an Internet Explorer, Windows Movie Maker, and Windows Media
Player 7 were used on Windows ME for the first time.
It was introduced on 17 February 2000. Basically, it was based on Microsoft
business-oriented system Windows NT, and later it provided the base for the
Windows
Windows XP. Furthermore, the automatic updating feature made their appearance
2000
for the first time on Windows 2000, and it was the first operating system to support
hibernation.
Windows XP was considered the best edition of Windows; it was introduced on 25
October 2001. It followed Windows ME and provided consumer-friendly
elements. The 64-bit version of Windows XP was introduced on 28 March 2003.
Furthermore, Its Professional x64 version was introduced on 24 April 2005.
The start button and taskbar were replaced by including the green Start button, blue
Windows
task bar, and vista wallpaper, as well as several shadows and more visual effects.
XP
It also brought some important features, such as ClearType, which helps to read
content on LCD screens, autoplay from CDs and other media, different automated
update, and recovery tools.
Additionally, It was used for the longest time, and even when it was discontinued,
it was used at an estimated 430 m PC.
It was introduced by Microsoft In January 2007. It was brought the better look and
feel user interface and included transparent elements, security, and search. When it
Windows
was in the development phase, its code name was "Longhorn." Windows Media
Vista
Player 11 and Internet Explorer 7 were made their appearance for the first time on
Windows Vista, included Windows Defender, an anti-spyware program. It was also

Page 8 of 9
provided some useful features such as Windows DVD Maker, speech recognition,
and Photo Gallery. Furthermore, it was the first operating system to be distributed
on DVD.
Windows
On 27 February 2008, Microsoft introduced Windows Server 2008.
Server 2008
It was introduced on 22 October 2009 to overcome all problems that were faced
by Windows Vista. It was released with user-friendly features and less dialogue
box overload. It was more stable, faster, and easy to use as compared to release
other previous versions. Additionally, the handwriting recognition feature was used
Windows 7
for the first time on Windows 7.
As IE was the default browser in Microsoft Windows, the antitrust investigations
used Microsoft in Europe for making it a default browser. Consequently, it had to
provide the users the option to choose and install the browser on the first boot.
Windows
On 4 September 2012, Microsoft was released Windows Server 2012.
Server 2012
It was introduced by Microsoft on 26 October 2012. It was released with new
features, such as a fast operating system, support for the USB 3.0 devices, and Web
Windows 8
store. The Web store is a place where you can download different types of Windows
applications; its full-screen mode was run for the first time on Windows 8.
It was launched by Microsoft on 17 October 2013. It was re-launched the Start
Windows button, which was able to display the Start screen from the desktop view of
8.1 Windows 8.1. Furthermore, it provided a way to select boot directly into the
desktop.
On 29 July 2015, Microsoft introduced Windows 10. It was released with some
new features such as switching between a keyboard and mouse mode and a tablet
Windows 10 mode, which was beneficial for the users who use computers like surface Pro 3 with
a detachable keyboard. It was designed for all Windows platforms across several
devices, as well as Windows tablets and Phones, including common applications.

Page 9 of 9

You might also like