Preview

Operating System security

Best Essays
Open Document
Open Document
3500 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Operating System security
Operating System Security

Abstract
Information systems are now becoming the social infrastructure so it is necessary to improve the security level because of privacy and data theft. One of the important issues which have to concern in the security of cyberspace is the security of operating system. This paper helps us to know about the security of most commercial Operating system like UNIX and
Microsoft windows which are widely using in whole world. Introduction
Computer system from network servers, desktops to laptops and hand held devices, they specially use a piece of software which know as operating system and execute on hardware that able to allocate the basic resources of system and supervises the execution of all applications within operating system. OS manages all types of resources management and security aspects.
Microsoft window, UNIX and Linux are example of operating system.
The security of an operating system of computer system will have fundamental impact to overall security of a computer system and also the application which are running in system. If we don’t proper control the execution of individual applications in an operating system may attack, from one application to other applications.
This level of protection provides safeguard of different applications in a multi-tasking,
Time sharing. No mechanisms are supported by operating system in the class that able to enforce policies to secure an individual applications .As we know that use of internet is growing widely so security of applications now become basic goal for millions of consumers who are turning their business to the public world of cyberspace. Efforts are going to made to achieve total security of a system and applications.

To raise the security of operating system, MAC is necessary. A typical MAC architecture needs the ability to enforce an administratively set security policy over all subjects and objects which are going to used like

You May Also Find These Documents Helpful

  • Good Essays

    Identify any hardware or programming that may be basic – Ultimately the security of the framework will be a basic segment to keep up business and individual records guaranteed. There are a considerable measure of programming choices available, for instance, McAfee or Symantec that offers a framework protection bundle that consolidates Anti-disease security, Network Firewall, Password organization, Anti-Spam Technology, data encryption and data fortification. The last will be a major instrument to setup remembering the true objective to keep up supervision of data in case of hard plate crash or any emergency that requires a structure restore.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

     I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    The reliance by companies of all sizes on information technology creates strong demand for system and network administration jobs. Information System majors will increasingly find themselves with opportunities and responsibilities in these areas. However, teaching operating systems and networking to information systems major presents many challenges. We have developed a model for teaching these topics to information systems majors in the context of operating system and network administration. This paper describes our model, the lecture materials used, and a novel lab configuration.…

    • 1732 Words
    • 7 Pages
    Good Essays
  • Better Essays

    There are some software’s that you cannot trust with a security computer systems software and hardware. Which different types of computer systems that can resulted in many possibility and use it very limited. Because ones approached with computer systems can always lead them to failure. Computer designing which often has hardware techniques are used to effective the security after they are design. The approach of the techniques and using the techniques security systems is having the effective of the design in the computer systems. The technique is to enforce the computer design principle and provide them with the function they need to attack and gain access to the program then need.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Air Wright case study

    • 1396 Words
    • 5 Pages

    Today if we are talking about computer security there are different terminologies that contribute in making the outline of computer security. It is the combination of different processes and mechanism by which important and sensitive information are secluded from publication and tampering by unauthorized persons. The major focus of computer security is to protect information and critical data from unauthorized usage. Computer security has deep roots in Information technology industry. Security in IT can be defined as a branch of computer science which is related to control of different kinds of risks associated with critical data. This can be done only if the authorized person dealing with the system network or administration secures this information with good software and servers which are designed to work heavily.…

    • 1396 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Os Security

    • 369 Words
    • 2 Pages

    1. What are the relative advantages and disadvantages of at least three different measures used to protect operating systems?…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Controls

    • 467 Words
    • 2 Pages

    There are a number of Information Technology security controls. The three most common are: physical, technical, and administrative controls; however, many organizations break down administrative controls into two separate categories: procedural and legal controls. "Security controls are the means of enforcing security policies that reflect the organization's business requirements, " (Johnson). Security controls are implemented to guarantee the information security C-I-A triad. Furthermore, security controls fall into three types of control classifications, they are: preventive, detective and corrective. These classifications are used to specify when a security control applies.…

    • 467 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Linux Security

    • 449 Words
    • 2 Pages

    IS3440 Final Exam Review IS3440 Final Exam Review skong@itt tech.edu skong@itt‐tech.edu CIA triad CIA triad Remote Access Remote Access Virtualization OSSTMM WINE Access control Access control Authentication Databases Authentication Databases Firewall support Firewall support /etc/sudoers /etc/passwd /etc/login.defs PAM Edit /etc/sudoers Edit /etc/sudoers file FHS FHS recommended to locate configuration files in the /etc/ path FHS /etc/fstab Samba Encrypted Partitions and Volumes Encrypted Partitions and Volumes…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Time Warner Cable (TWC) is one of the nation’s largest cable companies and being such has a large network of hardware and software at its disposal. According to "Time Warner Cable" (2013), its mission statement is to connect people and businesses with information, entertainment, and to give customers controls that are simple and easy to use. TWC utilizes Microsoft Windows XP and Microsoft Office giving the employees access from a TWC location or by a virtual private network (VPN) setup by the employee. Employees also have access to web based email that can be accessed via the internet anywhere in the World. In today’s business environment, technology is continually changing and improving. Operating systems and applications are used within companies worldwide to gather, disseminate, and control the flow of information. The application software can range from general covering a broad spectrum of information to addressing very specific information, enabling an organization to meet objectives.…

    • 796 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    References: 1. Andrews, J. (2009). A+ Guide to Managing and Maintaining Your PC, Comprehensive (6th ed.). : Cengage Learning, Inc.…

    • 4545 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    The difference between laws and ethics is laws are mandated and ethics are the basis of laws and the “right or wrongs” a person believes in.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Intro to Operating System

    • 907 Words
    • 4 Pages

    To understand three operating systems, you must first know what an operating system is. An operating system is software that controls the computer. It manages hardware, run applications, provides’ an interface for uses, stores, retrieves files. Here are three operating systems DOS, Windows 2000, and Linux. DOS, which is a disk operating system was the first OS within IBM computers. DOS was the operating system utilized by early versions of Windows including Windows 3.1 and 3.11. Next you have Windows 2000, which is an upgraded version of Windows NT and comes in numerous versions some are designed for the desktop and other designed high-end servers. Windows 2000 was a popular choice for corporate offices and their employees. The ultimate reason Windows 2000 was so successful over Windows NT was because it was more stable, support for Plug and Play, device manager, recovery console, activity directory, and better network support. At this time Windows 2000 is a dying operating system and provides no support from Microsoft due to the newer operating systems coming out at this time. The third operating system would be Linux is predominantly used for servers. Between Windows, and Mac, Linux is not a high option and is actually one to two percent of the desktop market. The creation of Linux was one of the best examples for free and open source software collaborations. Linux is packaged in a format known as Linux distribution for desktop and server use.…

    • 907 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Infrastructure is more secure. The first point that I will address consist on the multiple dangers that computer networks are expose, that are in majority done by hackers or somebody, that get access to servers of Windows and Linux to explode their vulnerabilities. For this reason, in general terms security; has we define the act of provide access of protection…

    • 732 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    Many commercial software packages are designed with computer security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices.…

    • 414 Words
    • 2 Pages
    Good Essays