20-04-2012, 05:17 PM
OPERATING SYSTEM SECURITY
operating system1.doc (Size: 77.5 KB / Downloads: 158)
ACKNOWLEDGEMENT
I am heartily thankful to my Sir ,Mr. Ramandeep singh , whose encouragement, guidance and support from the initial to the final level enabled me to develop an understanding of the subject.
Lastly, I offer my regards and blessings to all of those who supported me in any respect during the completion of the project.
Supreet kaur
CONTENT:
Introduction
Operating System Security Issues
precautions for Operating System Security
Protection Based on an OS mode
security threats in operating system
the most secure operating system
Conclusion
References
Introduction:
OS Security revolves around the appropriate protection of four elements.
Confidentiality prevents or minimizes unauthorized access and disclosure of data and information.
Integrity makes sure that the data being worked with is actually the correct data.
Availability is the property of a system or system resource being accessible and usable upon demand by an authorized system entity, according to performance specification for the system.
Authenticity makes possible that a computer system be able to verify the identity of a user.
What is operating system?
An operating system is a program designed to run other programs on a computer. A computer’s operating system is its most important program. It is considered the backbone of a computer, managing both software and hardware resources. Operating systems are responsible for everything from the control and allocation of memory to recognizing input from external devices and transmitting output to computer displays. They also manage files on computer hard drives and control peripherals, like printers and scanners.
The operating system of a large computer system has even more work to do. Such operatingsystems monitor different programs and users, making sure everything runs smoothly, without interference, despite the fact that numerous devices and programs are used simultaneously. An operating system also has a vital role to play in security. Its job includes preventing unauthorized users from accessing the computer system
Operating systems can be classified as follows:
multi-user : Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users.
multiprocessing : Supports running a program on more than oneCPU.
multitasking : Allows more than one program to run concurrently.
multithreading : Allows different parts of a single program to run concurrently.
real time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time.
Operating System Security Issues
Operating systems are the core of the computing environment--providing users a common and easy-to-use interface to the hardware and software installed on a computer. Exploits in operating system code wreak havoc on computers, giving hackers the ability to steal data and to damage both hardware and software. Operating system security is crucial because it protects the central control system of a computer.
Software Vulnerabilities:
Operating systems are composed of hundreds of thousands of lines of code. Because humans program and debug each operating system, hundreds of vulnerabilities are introduced into the code at development time. These weaknesses, ranging from simple unwanted behavior or error messages to full-scale system crashes and data corruption, can have catastrophic consequences on data management and productivity. Operating system manufacturers, such as Microsoft and Apple, frequently publish updates to the code, called patches, to fix these vulnerabilities and to ensure system stability.
Authentication:
Most operating systems have a login feature, or a method of separating users' files and access to a computer. Passwords and user names, which are used in every major operating system, provide controlled access to separate domains on a system (both on the hard disk and in the operating system memory itself). Security experts do not consider passwords to be a secure method of authentication because most users' passwords are easily guessed or written down and stored in an insecure place. Authentication spoofing (impersonating another authorized user) is a major security threat for operating systems as it allows the attacker to assume a different digital identity to steal data or launch further attacks.
Malware:
Malware, short for malicious software, hijacks an operating system to perform some sort of task for an attacker. Viruses, trojans and spyware are the most common form of malware, and each work to undermine operating system security controls. Hackers frequently turn compromised computers into "bots" or "zombies," forcing them to join networks of thousands of other systems to perform larger-scale attacks on businesses or governments. Malware usually requires some sort of user action--downloading and running an infected file, or plugging in a compromised USB key--to break into an operating system.
Physical Security:
Physical security is the most important method of ensuring operating system security. Since operating system code and configuration files are installed on a system's hard drive, an attacker with physical access to the system can easily modify, delete or steal critical files on a system. For this reason, most commercial servers are stored in locked rooms and monitored by armed security guards.
precautions for Operating System Security:
Flaws in the operating systems of computers are discovered almost daily. The majority of viruses take advantage of these flaws to infect your computer. Once a virus enters your system, it can potentially cause devastating damage. To avoid contracting a virus, you should take the following basic precautions:
Software Updates - Make sure that the software on your computer is regularly updated. By doing so, most viruses can be avoided. We recommend setting your computer to check for software updates automatically.
Firewall - Run a firewall program on your computer. A firewall is a device or program that blocks undesired Internet traffic, including viruses, from accessing your computer. Both Windows and Mac OS X have built-in firewall programs that are easy to set up. By blocking unwanted Internet traffic, a lot of viruses and bugs can be stopped dead in their tracks!
Account Management - Manage the user accounts on your computer, so you can control exactly who can log into your machine. Especially on Windows XP machines, it is easy to accidentally leave your computer wide open to unauthorized users.
Antivirus Software - Use your antivirus software to scan for viruses as files are being launched.