Wednesday, 9 January 2019

Security Environment and Program Threats in OS Security

Security Environment


Security Problem
  • Security must consider external environment of the system, and protect the system resources.
  • Intruders (crackers) attempt to breach security.
  • Threat is potential security violation.
  • Attack is attempt to breach security.
  • Attack can be accidental or malicious.
  • Easier to protect against accidental than malicious misuse.
Intruders
  • Snooping by insiders
  • Determined attempt to make money
  • Casual prying by nontechnical users
  • Commercial or military espionage

Accidental Data Loss
  • Hardware or Software error
            - CPU malfunction
            - Disk crash
            - Program bugs
  • Human errors
           - Data entry
           - Wrong tape mounted
  • Acts of God
           - Fires
           - Earthquakes
           - Wars


Program Threats
  • Trojan Horse
         - Code segment that misuses its environment
         - Exploits mechanisms for allowing programs written by users to be executed by other users.
         - Spyware, pop-up browser windows, convert channels
  • Trap Door
         - Specific user identifier or password that circumvents normal security procedures.
         - Could be included in a compiler.
  • Logic Bomp
          - Program that initiates a security incident under certain circumstances
  • Stack and Buffer Overflow
          - Exploits a bug in a program (overflow either the stack or memory buffers)
  • Viruses
         - Code fragment embedded in legitimate program
         - Very specific to CPU architecture, operating system, applications
         - Usually borne via email or as a macro
              * Visual Basic Macro to reformat hard drive
                     Sub AutoOpen( )
                      Dim oFS
                         set oFS = CreateObject("Scripting.FileSystemObject")
                           vs = Shell("c:command.com/kformat  c:" ,vbHide)
                                End Sub


Related Posts:

  • Network Security Network Security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software… Read More
  • Information Gathering What is Information Gathering ? The process of well knowing the target, digging details, foot printing and keep in touch with the target is c… Read More
  • OS Security Goals, Policy & Model and Access Control Techniques  Security Goals Secrecy (confidentiality) - Unauthorized disclosure - Limits the objects (files/sockets) that a process can read Integrit… Read More
  • Computer Security Computer Security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data,… Read More
  • Ethical Hacking What is Hacking ?  Hacking is the act of finding the possible entry points that exist in a computer system or a computer network an… Read More

0 Comments:

Post a Comment

Popular Posts

Categories

100 Python Programs for Beginner (96) AI (39) Android (24) AngularJS (1) Api (2) Assembly Language (2) aws (17) Azure (7) BI (10) book (4) Books (197) C (77) C# (12) C++ (83) Course (67) Coursera (249) Cybersecurity (25) Data Analysis (2) Data Analytics (2) data management (11) Data Science (148) Data Strucures (8) Deep Learning (21) Django (16) Downloads (3) edx (2) Engineering (14) Euron (29) Events (6) Excel (13) Factorial (1) Finance (6) flask (3) flutter (1) FPL (17) Generative AI (11) Google (36) Hadoop (3) HTML Quiz (1) HTML&CSS (47) IBM (30) IoT (1) IS (25) Java (93) Java quiz (1) Leet Code (4) Machine Learning (85) Meta (22) MICHIGAN (5) microsoft (4) Nvidia (4) Pandas (4) PHP (20) Projects (29) pyth (1) Python (1034) Python Coding Challenge (454) Python Quiz (113) Python Tips (5) Questions (2) R (70) React (6) Scripting (1) security (3) Selenium Webdriver (4) Software (17) SQL (42) UX Research (1) web application (8) Web development (4) web scraping (2)

Followers

Python Coding for Kids ( Free Demo for Everyone)