Operating System Security
Operating System Security
Every computer system and software design must handle all security risks and
implement the necessary measures to enforce security policies. At the same time,
it's critical to strike a balance because strong security measures might increase
costs while also limiting the system's usability, utility, and smooth operation. As a
result, system designers must assure efficient performance without compromising
security.
In this article, you will learn about operating system security with its issues and
other features.
System security may be threatened through two violations, and these are as
follows:
1. Threat
2. Attack
There are two types of security breaches that can harm the system: malicious and
accidental. Malicious threats are a type of destructive computer code or web
script that is designed to cause system vulnerabilities that lead to back doors and
security breaches. On the other hand, Accidental Threats are comparatively easier
to protect against.
Security may be compromised through the breaches. Some of the breaches are as
follows:
1. Breach of integrity
2. Theft of service
3. Breach of confidentiality
4. Breach of availability
5. Denial of service
There are several goals of system security. Some of them are as follows:
1. Integrity
Unauthorized users must not be allowed to access the system's objects, and users
with insufficient rights should not modify the system's critical files and resources.
2. Secrecy
3. Availability
All system resources must be accessible to all authorized users, i.e., no single
user/process should be able to consume all system resources. If such a situation
arises, service denial may occur. In this case, malware may restrict system
resources and preventing legitimate processes from accessing them.
Types of Threats
There are mainly two types of threats that occur. These are as follows:
Program threats
The operating system's processes and kernel carry out the specified task as
directed. Program Threats occur when a user program causes these processes to
do malicious operations. The common example of a program threat is that when a
program is installed on a computer, it could store and transfer user credentials to
a hacker. There are various program threats. Some of them are as follows:
1.Virus
A virus may replicate itself on the system. Viruses are extremely dangerous and
can modify/delete user files as well as crash computers. A virus is a little piece of
code that is implemented on the system program. As the user interacts with the
program, the virus becomes embedded in other files and programs, potentially
rendering the system inoperable.
2. Trojan Horse
This type of application captures user login credentials. It stores them to transfer
them to a malicious user who can then log in to the computer and access system
resources.
3. Logic Bomb
4. Trap Door
System Threats
System threats are described as the misuse of system services and network
connections to cause user problems. These threats may be used to trigger the
program threats over an entire network, known as program attacks. System
threats make an environment in which OS resources and user files may be
misused. There are various system threats. Some of them are as follows:
1. Port Scanning
2. Worm
The worm is a process that can choke a system's performance by exhausting all
system resources. A Worm process makes several clones, each consuming system
resources and preventing all other processes from getting essential resources.
Worm processes can even bring a network to a halt.
3. Denial of Service
Denial of service attacks usually prevents users from legitimately using the
system. For example, if a denial-of-service attack is executed against the
browser's content settings, a user may be unable to access the internet.
There are various threats to the operating system. Some of them are as follows:
Malware
It contains viruses, worms, trojan horses, and other dangerous software. These
are generally short code snippets that may corrupt files, delete the data, replicate
to propagate further, and even crash a system. The malware frequently goes
unnoticed by the victim user while criminals silently extract important data.
Network Intrusion
Buffer Overflow
It is also known as buffer overrun. It is the most common and dangerous security
issue of the operating system. It is defined as a condition at an interface under
which more input may be placed into a buffer and a data holding area than the
allotted capacity, and it may overwrite other information. Attackers use such a
situation to crash a system or insert specially created malware that allows them
to take control of the system.
There are various ways to ensure operating system security. These are as follows:
Authentication
The process of identifying every system user and associating the programs
executing with those users is known as authentication. The operating system is
responsible for implementing a security system that ensures the authenticity of a
user who is executing a specific program. In general, operating systems identify
and authenticate users in three ways.
1. Username/Password
Every user contains a unique username and password that should be input
correctly before accessing a system.
2. User Attribution
To login into the system, the user must punch a card into a card slot or enter a
key produced by a key generator into an option provided by the operating
system.
1. Secret Key
The user is given a hardware device that can generate a secret id that is linked to
the user's id. The system prompts for such a secret id, which must be generated
each time you log in.
2. Random numbers
Users are given cards that have alphabets and numbers printed on them. The
system requests numbers that correspond to a few alphabets chosen at random.
3. Network password
Firewalls
Firewalls are essential for monitoring all incoming and outgoing traffic. It imposes
local security, defining the traffic that may travel through it. Firewalls are an
efficient way of protecting network systems or local systems from any network-
based security threat.
Physical Security
As OS security policies and procedures cover a large area, there are various
techniques to addressing them. Some of them are as follows: