Operating system Security-1
Operating system Security-1
operating system from dangers, including viruses, worms, malware, and remote hacker
intrusions. Operating system security comprises all preventive-control procedures that
protect any system assets that could be stolen, modified, or deleted if OS security is
breached.
Security refers to providing safety for computer system resources like software, CPU,
memory, disks, etc. It can protect against all threats, including viruses and unauthorized
access.
➢ Integrity
➢ Secrecy
➢ availability
1
2
Integrity ensures that unauthorized users must not be allowed to access the system’s
objects, and users with insufficient rights should not modify the system’s critical files and
resources.
Secrecy ensures that the system’s objects must only be available to a small number of
authorized users. The system files should not be accessible to everyone; system files
control how data is being stored and retrieved. Examples of system files are:
▪ Device drivers
Availability ensures that the system is available to authorized users when they need it
and availability. If an illegal user runs a computer application, the computer or data
stored may be seriously damaged.
System security may be threatened through two violations, and these are as follows:
1. Threat: A program that has the potential to harm the system seriously.
There are two types of security breaches that can harm the system:
✓ malicious
✓ accidental.
Malicious threats are a type of destructive computer code or web script that is
designed to cause system vulnerabilities that lead to back doors and security breaches.
On the other hand, Accidental Threats are comparatively easier to protect against.
2
3
Security may be compromised through the breaches. Some of the breaches are as
follows:
1. Breach of integrity
2. Theft of service
3. Breach of confidentiality
4. Breach of availability
5. Denial of service
It includes preventing legitimate use of the system. Some attacks may be accidental.
Types of Threats
There are mainly two types of threats that occur. These are as follows:
Program threats
The operating system's processes and kernel carry out the specified task as directed.
Program Threats occur when a user program causes these processes to do malicious
operations. The common example of a program threat is that when a program is
3
4
installed on a computer, it could store and transfer user credentials to a hacker. There
1.Virus
A virus may replicate itself on the system. Viruses are extremely dangerous and can
modify/delete user files as well as crash computers. A virus is a little piece of code that is
implemented on the system program. As the user interacts with the program, the virus
becomes embedded in other files and programs, potentially rendering the system
inoperable.
2. Trojan Horse
This type of application captures user login credentials. It stores them to in order to
transfer to a malicious user who can then log in to the computer and access system
resources.
3. Logic Bomb
A logic bomb is a situation in which software only misbehaves when particular criteria
4. Trap Door
A trap door is when a program that is supposed to work as expected has a security
weakness in its code that allows it to do illegal actions without the user's knowledge.
System Threats
System threats are described as the misuse of system services and network connections
to cause user problems. These threats may be used to trigger the program threats over
an entire network, known as program attacks. System threats make an environment in
4
5
which OS resources and user files may be misused. There are various system threats.
1. Port Scanning
It is a method by which the cracker determines the system's vulnerabilities for an attack.
It is a fully automated process that includes connecting to a specific port via TCP/IP. To
protect the attacker's identity, port scanning attacks are launched through Zombie
Systems, which previously independent systems now serve their owners while being
2. Worm
The worm is a process that can choke a system's performance by exhausting all system
resources. A Worm process makes several clones, each consuming system resources and
preventing all other processes from getting essential resources. Worm processes can
even bring a network to a halt.
3. Denial of Service
Denial of service attacks usually prevents users from legitimately using the system. For
There are various threats to the operating system. Some of them are as follows:
5
6
Malware
It contains viruses, worms, trojan horses, and other dangerous software. These are
generally short code snippets that may corrupt files, delete the data, replicate to
propagate further, and even crash a system. The malware frequently goes unnoticed by
the victim user while criminals silently extract important data.
Network Intrusion
access to and misuses programs, data, or resources. A rascal user takes supervisory
authority and tries to evade access constraints and audit collection.
Buffer Overflow
It is also known as buffer overrun. It is the most common and dangerous security issue
of the operating system. It is defined as a condition at an interface under which more
input may be placed into a buffer and a data holding area than the allotted capacity,
and it may overwrite other information. Attackers use such a situation to crash a system
or insert specially created malware that allows them to take control of the system.
There are various ways to ensure operating system security. These are as follows:
Authentication
The process of identifying every system user and associating the programs executing
with those users is known as authentication. The operating system is responsible for
6
7
implementing a security system that ensures the authenticity of a user who is executing
1. Username/Password
Every user contains a unique username and password that should be input correctly
before accessing a system.
2. User Attribution
These techniques usually include biometric verification, such as fingerprints, retina scans,
etc. This authentication is based on user uniqueness and is compared to database
samples already in the system. Users can only allow access if there is a match.
To login into the system, the user must punch a card into a card slot or enter a key
Along with standard authentication, one-time passwords give an extra layer of security.
Every time a user attempts to log into the One-Time Password system, a unique
password is needed. Once a one-time password has been used, it cannot be reused.
One-time passwords may be implemented in several ways.
1. Secret Key
7
8
The user is given a hardware device that can generate a secret id that is linked to the
user's id. The system prompts for such a secret id, which must be generated each time
you log in.
2. Random numbers
Users are given cards that have alphabets and numbers printed on them. The system
requests numbers that correspond to a few alphabets chosen at random.
3. Network password
Firewalls
Firewalls are essential for monitoring all incoming and outgoing traffic. It imposes local
security, defining the traffic that may travel through it. Firewalls are an efficient way of
protecting network systems or local systems from any network-based security threat.
Physical Security
important files since operating system code and configuration files are stored on the
hard drive.
organization that you are working in. In general, an OS security policy is a document
that specifies the procedures for ensuring that the operating system maintains a specific
OS Security protects systems and data from worms, malware, threats, ransomware,
backdoor intrusions, viruses, etc. Security policies handle all preventative activities and
8
9
deleted data.
As OS security policies and procedures cover a large area, there are various techniques
to addressing them. Some of them are as follows:
OS security policies and procedures are developed and implemented to ensure that you
must first determine which assets, systems, hardware, and date are the most vital to
your organization. Once that is completed, a policy can be developed to secure and
When you are looking for an unwanted program running in your operating system you
should pay attention to the following:
9
10
It is not always an option to rely on an antivirus and antimalware software. You need to
know how to detect and remove unsolicited programs yourself.
If you suspect that your computer is running a malware, you should do the following:
Daily several security holes and vulnerability are being detected on windows OS. If you
fail to install security patches as soon as they become available, you network OS will
cease to be yours. Some of these bugs that may attack your system can put your OS or
the entire system in a jeopardy.
Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks. It's also known as information
technology security or electronic information security. The term applies in a variety of
contexts, from business to mobile computing, and can be divided into a few common
categories.
10
11
1. Cybercrime includes single actors or groups targeting systems for financial gain or to
cause disruption.
So, how do malicious actors gain control of computer systems? Here are some common
methods used to threaten cyber-security:
Malware
Malware means malicious software. One of the most common cyber threats, malware is
software that a cybercriminal or hacker has created to disrupt or damage a legitimate
user’s computer. Often spread via an unsolicited email attachment or legitimate-looking
download, malware may be used by cybercriminals to make money or in politically
motivated cyber-attacks.
· Virus: A self-replicating program that attaches itself to clean file and spreads
throughout a computer system, infecting files with malicious code.
· Trojans: A type of malware that is disguised as legitimate software.
Cybercriminals trick users into uploading Trojans onto their computer where they
cause damage or collect data.
· Spyware: A program that secretly records what a user does, so that
cybercriminals can make use of this information. For example, spyware could
capture credit card details.
· Ransomware: Malware which locks down a user’s files and data, with the
threat of erasing it unless a ransom is paid.
· Adware: Advertising software which can be used to spread malware.
12
13
What is Vulnerability?
A vulnerability in information system is a flaw or weakness that leaves a system open to
attack that can be exploited by hazards, attacks vectors or cybercriminals to perpetrate an
authorized action or security breach.
Types of vulnerabilities
▪ Hardware vulnerabilities
▪ Software vulnerabilities
▪ Network and Protocol vulnerabilities
▪ Human resource vulnerabilities
▪ Physical and environmental vulnerabilities
▪ Unsecure Data Center and IT facilities
SQL injection
▪ SQL injection attack is the insertion of nefarious SQL code into a database for
execution.
13
14
▪ The aim of this attack is to give the cyber criminal control of a data base driven
application.
▪ When access is gained to the database the attacker can then access or delete data,
change an application’s data driven behavior and perform operation that suites the
desire of the attacker.
▪ An SQL injection attack mostly occurs when a software uses data from untrusted
source.
Phishing
Phishing is when cybercriminals target victims with emails that appear to be from a
legitimate company asking for sensitive information. Phishing attacks are often used to
dupe people into handing over credit card data and other personal information.
Man-in-the-middle attack
Denial-of-service attack
14
15
o An attacker spots the zero-day vulnerability before a fix is developed for it.
o The vulnerability window is time between when the vulnerability is identified and
when it is fixed.
1. Update your software and operating system: This means you benefit from the
latest security patches.
2. Use anti-virus software: Security solutions like Kaspersky Total Security will
detect and removes threats. Keep your software updated for the best level of
protection.
3. Use strong passwords: Ensure your passwords are not easily guessable.
4. Do not open email attachments from unknown senders: These could be
infected with malware.
5. Do not click on links in emails from unknown senders or unfamiliar
websites:This is a common way that malware is spread.
6. Avoid using unsecure WiFi networks in public places: Unsecure networks
leave you vulnerable to man-in-the-middle attacks.
15