Operating System Security Flaws

In: Computers and Technology

Submitted By deefamouss
Words 986
Pages 4
Operating System Security Flaws
Donique Tulloch
POS/355 Introduction to Operational Systems - Yevgeniy Tovshteyn

Operating System Security Flaws

Vulnerable, as defined by the dictionary is being capable of or susceptible to being hurt or wounded by a weapon. In computer science, to be vulnerable means to be open to attack. Vulnerability in a computer’s system is a weakness and this weakness can be preyed on by attackers to take advantage of the system’s private data. In using a system, we are assured that the data we input is stored securely and processed for the intended purpose only. So the susceptibility of the system, the attacker’s access to this flaw and the capability to exploit this flaw compose the elements of computer vulnerability. For this flaw to be exploited, the attacker must have an attack surface, meaning the attacker must have some technique or tool to exploit the system.
One classification of a vulnerability is security bug or defect, where a firewall may be out of date or in this case, Windows Defender is significantly out of date leaving the system with a window of vulnerability to attacks. This window would be from when the bug was discovered, access was removed, a fix was available and if or when an attack was disabled. Windows Defender was designed as a free software to defend against unwanted attacks as a combination of Microsoft Security essentials. With proper security patch updating, Windows should have minimal security bug and any other vulnerabilities present in the system. It is still recommended to have some additional Antivirus program depending on the daily use of the system. This means that if the user is downloading a lot of programs, music, movies from the internet, then it is recommended to have good programs defending your system and also to alert you of intrusion.
Windows, when designed was not designed with internet…...

Similar Documents

Operating System

...challenges and issues introduced by this relatively new concept (Sriram &ump; Khajeh-Hosseini, 2009). As experienced by large or small companies while adopting cloud computing technology, the issues can be outlined as security, privacy, data migration as (Hosseini, et al., 2010 ). Adoption of cloud technology by enterprises especially those are using KBE (knowledge based engineering) systems are in risk in terms of migration their data over the cloud. Most enterprises are in a midst of creating, sharing, streaming and storing data in digital formats to allow collaboration , hence there is a need to continuously managed and protect the data to ensure its value and authenticity (Yale &ump; Chow, 2011). Enterprises now acquire increasingly more information about their products, customers and partners- whether it’s stored in a cloud environment or not and failure to protect this data can be damaging. Partners and clients anticipate their information will be constantly protected before conducting business with a company. Within lay the need for complete data governance to manage and protect crucial data, which has become a key issue for the cloud (Yale, 2011). The literature review aims to address the adoption of cloud computing within enterprises those are using KBE systems and how this adoption of cloud will affect their data governance strategies by drawing findings from different practices and other studies. The report will highlight importance of cloud computing in......

Words: 2090 - Pages: 9

Operating Systems

...Researching operating systems I am choosing Windows XP for the basic low end computer because the system requirements are fairly low and it will work on just about any personal computer that is being used today. The operating system I am choosing for the high end computer is Windows 7. Its requirements are tailor-made more for the newer and higher end computers. Some of the computers that are out there will not be able to run windows 7. Windows XP system requirements are a Pentium 233 megahertz processor, at least 64 megabytes of system memory, at least 1.5 gigabytes of hard disk space, CD-ROM or DVD drive, video adaptor, and a monitor with a screen resolution of 800x600 or higher. Windows XP doesn’t have a very memory intensive graphical user interface either. If you are upgrading from Windows 2000 you probably won’t notice too much of a difference as far as the general look and feel of the operating system. You will have to activate it soon after you install the program to keep it from deactivating. Windows XP also has better security and protection than previous versions. Windows 7 system requirements are 1 gigahertz or faster processor, 1 gigabyte of system memory for 32 bit systems and 2 gigabytes of system memory for 64 bit systems, 16 gigabytes of hard disk space for 32 bit systems and 20 gigabytes of hard disk space for 64 bit systems, support for DirectX 9 with windows display driver model 1.0 and 128 megabytes of memory for the Aero theme desktop, a......

Words: 534 - Pages: 3

Operating System Comparisons

...Operating System Comparisons PRG/355 January 14, 2013 Steven Kernan Operating System Comparisons Table of Contents Introduction 3 Memory Management 3 File Management 4 Security 4 Conclusion 4 Reference 5 Introduction An operating system (OS) is software that manages the hardware and software resources of a computer system. Basically an OS is a set of libraries or functions which programs may use to perform specific tasks relating to interfacing with computer system components (The Computer Technology Documentation Project, n.d.). Advantages and disadvantages exist in every operating system. Reviewed in this paper is a comparison of some of the primary responsibilities of popular operating systems. The review includes Unix/Linux, Mac, and Microsoft Windows operating systems. Memory Management An important function of the OS is to manage the computer systems memory. Programs, processes, and resource do not simply float around in memory haphazardly. Memory is shared among these processes and resources. Accordingly, managed by the OS is an organized structure of locating processes in computer memory locations. The two primary types of memory controlled by an OS are main memory and virtual memory. Main memory is… (need general definition). Virtual (secondary) memory is… (need general definition). Intended memory management requirements include relocation, protection, sharing, logical organization, and physical organization. Processes......

Words: 1019 - Pages: 5

Operating Systems

...Paper: Operating Systems Analysis Paper POS/355 November 7, 2011 Jeff Rugg Introduction The operating system, commonly known as OS, is the brain or the center of all computer systems. It controls the input/output and controls various tasks of the hardware. Apart from serving as a go-between for application programs and the hardware of the computer, the OS also consists of information and programs while providing general services to make sure that several software applications can operate accordingly. Operating systems can be found in almost any type of a computer device such as personal computers, supercomputers, cellular telephones, and video game consoles as stated by Linux Systems (2011). As the research was being conducted for this paper, it raised a question whether the internet uses the operating system? It proved to be a challenge to actually pin point the most common operating systems on the Internet, but as the research continued, it was obvious that these three, Windows, Mac OS X, and Linux are considered to be the most common operating systems used on the Internet today. Background of each Operating System Windows Privately owned operating systems, Microsoft Windows is generally used on personal computers and as of today, the most commonly used version is Windows XP with the new version of Windows 7 for personal computers and Windows Server 2008 R2 for servers is entering the market. Mac OS X Mac OS X is a graphical operating system which......

Words: 1150 - Pages: 5

Operating Systems

...MODERN OPERATING SYSTEMS SECOND EDITION by Andrew S. Tanenbaum Publisher: Prentice Hall PTR ISBN 0-13-031358-0, 976 pages Table of Contents About the Author MODERN OPERATING SYSTEMS PREFACE 1 INTRODUCTION 1.1 WHAT IS AN OPERATING SYSTEM? 1.1.1 The Operating System as an Extended Machine 1.1.2 The Operating System as a Resource Manager 1.2 HISTORY OF OPERATING SYSTEMS 1.2.1 The First Generation (1945-55) Vacuum Tubes and Plugboards 1.2.2 The Second Generation (1955-65) Transistors and Batch Systems 1.2.3 The Third Generation (1965-1980) ICs and Multiprogramming 1.2.4 The Fourth Generation (1980-Present) Personal Computers 1.2.5 Ontogeny Recapitulates Phytogeny 1.3 THE OPERATING SYSTEM ZOO 1.3.1 Mainframe Operating Systems 1.3.2 Server Operating Systems 1.3.3 Multiprocessor Operating Systems 1.3.4 Personal Computer Operating Systems 1.3.5 Real-Time Operating Systems 1.3.6 Embedded Operating Systems 1.3.7 Smart Card Operating Systems 1.4 COMPUTER HARDWARE REVIEW 1.4.1 Processors 1.4.2 Memory 1.4.3 I/O Devices 1.4.4 Buses 1.5 OPERATING SYSTEM CONCEPTS 1.5.1 Processes 1.5.3 Memory Management 1.5.4 Input/Output 1.5.5 Files 1.5.6 Security 1.5.8 Recycling of Concepts 1.6 SYSTEM CALLS 1.6.1 System Calls for Process Management 1.6.2 System Calls for File Management 1.6.3 System Calls for Directory Management 1.6.4 Miscellaneous System Calls 1.6.5 The Windows Win32 API 1.7 OPERATING SYSTEM STRUCTURE 1.7.1 Monolithic Systems 1.7.2 Layered Systems 1.7.3 Virtual Machines......

Words: 387392 - Pages: 1550

Operating System

...Paper: Open Source Operating Systems Linux is one of the modern, free open source operating system provides speed, performance, stability, and reliability comparable to commercial operating systems. Kernel performance, System libraries and System utilities added by Linux open source development community, licensing and compatibility across distributions made Linux successful. (Silberschatz, Galvin, Gagne Wiley & Sons, 2011, page.38) Kernel Performance: The core Linux operating-system kernel is entirely original and implemented as a traditional monolithic kernel for performance reasons. Kernel design is modular enough to allow most drivers to be dynamically loaded and unloaded at run time. The initial kernel does not have networking support, limited device driver’s support and basic virtual memory system included. Kernel is evolved with time by supporting technologies like improved TCP/IP performance, ISDN. Latest kernel supports remotely mount / un-mount volumes, internal kernel threads, loadable modules, automatic loading modules on demand, dynamic kernel configuration at run time, symmetric multiprocessors, and journal file systems. Kernel mode allows a process to be pre-empted while running. (Silberschatz, Galvin, Gagne Wiley & Sons, 2011, page.802) The Linux System: The kernel forms only the core operating system. Kernel is responsible of maintaining all important abstractions of the operating systems including virtual memory and processes. System libraries......

Words: 1110 - Pages: 5

Operating System

...Operating System Introduction Operating Systems have come a long way since the times of a separate windows system and Disk Operating System (DOS). Now, both systems are combined which made DOS obsolete. According to Capron (2001), “An operating system is a set of programs that lies between applications software and computer hardware; it is the fundamental software that controls access to all other software and hardware resources” (p. 65). Operating systems have three main functions: to manage computer resources, to establish user interface and to execute and provide services for application software. The computer would just be useless machine with no direction or purpose without an operating system. According Nickerson (2001), “The most important system software is the operating system because without it computers would be extremely difficult to use” (p. 31). Operating System Compatibility in the Workplace Watts-Smith and Cheng (2004) define compatibility as, “The ability of all hardware and all software in one unit, such as a computer, to work together without difficulty” (no pg.). As with a perfect world, there is no such thing as a perfect computer or software. There will always be compatibility issues with their set of patches and service packs to assist in the smooth operation of a computer information system. In the case of operating systems, upgrades always bring their host of compatibility problems or issues. While most compatibility issues go relatively......

Words: 1353 - Pages: 6

Operating Systems

...List and explain how operating system are classified (25) 2. Give a brief discussion on the structures of an operating system, monolithic and layered (25) (1).List and explain how operating system are classified (25) The operating system is the most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as: * recognizing input from the keyboard, * sending output to the display screen, * keeping track of files and directories on the disk, and * Controlling peripheral devices such as disk drives and printers. Operating systems can be classified as follows: Multi-user : Multi-user allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users. This type of operating systems allows multiple users to use the system resources simultaneously. A multi-user operating system allows multiple users to access a computer system concurrently. Time-sharing systems can be classified as multi-user systems as they enable multiple-user access to a computer through the sharing of time. : Windows vista, Mac X tiger etc. Single-user: Single-user operating systems, as opposed to multi-user operating systems, are usable by a single user at a time. Being able to use multiple accounts on a Windows operating system does not make......

Words: 1701 - Pages: 7

Operating Systems

...DENIS In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems. What are two such problems? A time sharing environment or multi programming is one in which a computer system provides direct communication between the user and the system. It allows many users to share the computer at the same time. One of the problems that may result from the fact that resources are being shared is information theft, this is because all the users are able to access the files that are being shared on the system and so one can easily copy a file and modify it without the knowledge of all the other parties. Such scenarios can result into loss of security confidentiality and integrity since the owner of a file Without being aware of the system used as time-sharing and multiprogramming, may insert or have a secret or confidential data that he wants to remain at the file and also other users may change, add, or even remove some information in the file if they want to, since they have access to all files running on the system The other problem resulting from using such systems is the fact that there could be loss of storage space. Since users have equal privileges to create and access files on the system, then there could be a possibility that the users will create numerous files and eat up the storage space on the system without the other users’ knowledge, so as time goes by, each user will......

Words: 1053 - Pages: 5

Operating Systems

...Operating Systems Christy Kegley IT/282 3/2/2014 Carlton Foster Operating Systems * Provide a brief history of three operating systems. The top three operating systems are; Windows XP, Windows Vista, and Linux. “Windows XP is the first Windows OS to allow multiple users to log on simultaneously to the OS, each with their own applications open. Although Windows XP was first released with some bugs, the second service pack (Service Pack 2) resolved most of these problems. XP underwent three service packs. It is an extremely stable OS and was popular in both the home and corporate markets” (Guide to Managing and Maintaining Your PC, Eighth Edition, Andrews, pg. 1116). This programs allows users to do many things that others might not allow like older versions of Windows. Windows Vista is the newest version of Windows. This program is not very popular with some people because there is a lack of compatibility with other programs, also it slows performance. “The first problem is partly caused by hardware manufacturers not providing Vista drivers for their devices that were originally sold with XP drivers. The second problem means that many low end desktop and laptop computers can’t run Vista. And the slow performance of Vista is partly due to the many unnecessary features (fluff) it offers; these features weigh heavy on system resources. Vista comes in five versions: Windows Vista Home Basic, Home Premium, Business, Enterprise, and Ultimate. (Vista......

Words: 764 - Pages: 4

Operating System

...1.5 * Modern OS are interrupt driven. Events are almost signaled by the occurrence of an interrupt or a trap, which caused either by an error or by a specific request from a user program that an OS service be performed . * Dual-mode Operation allows OS to protect itself and other system components whereas Multimode Operation increasingly CPUs support multi-mode operations. * System call provides the means for a user program to ask OS to perform OS tasks on the user program’s behalf. When a system callis executed, it is treated by H/W as a S/W interrupt. * Timer protects CPU resource from getting stuck by a user program. To ensure OS maintains control over the CPU, a timer can be set to interrupt the computer after a specified period. Use it to prevent a user program from running too long. 1.6 * A process is a program in execution. It is a unit of work in the system. A program by itself is not a process. It is a passive entity, like the contents of a file stored on disk, whereas a process is an active entity. 1.7 * To improve CPU utilization and responsive time, general-purpose computers must keep several programs in memory, creating a need for memory management. 1.8 * OS provides a uniform, logical view of information storage. * Caching is an important principle, performed at many levels in a computer and an information in use copied from slower to faster storage temporarily. There are Hardware cache and Software-controlled......

Words: 380 - Pages: 2

Riordan Operating Systems Security

...the Riordan Manufacturing Headquarters with the computers. We counted a quantity of 35 Dell Optiplex computers. The computers have 2.6 GHz processors, 512 Megabytes of Random Access Memory, and 60 Gigabytes of hard drive storage. These computers are loaded with the Microsoft Windows 2000 operating system and the Microsoft Office 2000 office application. The next item that we inventoried was the Apple Macintosh computers. There were 15 of these computers at the headquarters facility. They have dual 2.8 GHZ processors, 1 Gigabytes of Random Access Memory, and 1 Gigabyte hard drives. The servers consist of 2 IBM H520 Blade Servers for network purposes. These servers have dual Xeon 2.8 GHz processors and 1 Gigabytes of Random Access Memory. We also took note of a third IBM H520 Blade Server used for the purpose of exchange. This server also has dual Xeon 2.8 GHz processors and 1 Gigabytes of Random Access Memory. All three of these servers run a server version of the Microsoft Windows operating system. There is also an IBM pSeries server that has a 6E4 Multiprocessor, 1 Gigabytes of Random Access Memory, a 80 Gigabyte hard drive and is used for ERP/MRP. This server runs the UNIX operating system. We found the additional network hardware at the headquarters facility. There are 2 Voice over Internet Protocol routers, 2 Cisco 5950 24 port switches, 1 Linksys EF2H24 24 port hub, and 2 gateway switches. We also located 3 Phaser color printers and 1 Hewlett Packard Plotter. There is a......

Words: 1245 - Pages: 5

Operating Systems

...Operating Systems Vulnerabilities NAME POS 355 18 Mar 15 Carol Eichling Operating Systems Vulnerabilities As the reported number of security vulnerabilities continued to spike in the 20th century let us define a security flaw. A security flaw according to "Apple Security Flaw: What You Need To Know" (2014), "The flaw is in the way the operating system provides the essential services, known as secure sockets layer (SSL) or transport layer security (TLS). These two layers of security allow information to be transmitted worry-free between browsers and web servers, or between a mail server and mail client. SSL is in the form of encryption, which scrambles data sent over a network to keep it private. The second layer involves verification that the server is authentic." With the heighten computer security regarding vulnerabilities, the increase of user awareness and training users to not click on particular links is difficult yet feasible. Although most operating system has computer security protection, the tasks of protecting the systems from vulnerabilities are a daunting task because the operating systems are unique. Security flaw in Microsoft and Mac OS X® A known security flaw in Windows is called the Freak. The Freak security flaw allowed hackers to create a simulated middle person attacks on the encrypted secure sockets layer and transport layer of a security connections. It was discovered that hackers could force websites to weaken the system......

Words: 843 - Pages: 4

Operating Systems

... ZETECH UNIVERSITY NAME: RUTERE JOAN WANJA REG. NO: DBIT-02-0035/2015 SCHOOL: I.T COURSE: DBIT UNIT NAME: OPERATING SYSTEMS TASK: CAT 2 LECTURER: MR FRED 1. Context Switching It is the process of storing of storing and restoring the state (context) of a process or thread so that the execution can be resumed from the same point at a later time. There are three potential triggers for a context switch: • Multitasking: Most commonly, within some scheduling scheme, one process needs to be switched out of the CPU so another process can run.This context switch can be triggered by the process making itself unrunnable, such as by waiting for an I/O or synchronization operation to complete. On a pre-emptive multitasking system, the scheduler may also switch out processes from being starved of CPU time, preemptive schedulers often configure a timer interrupt to fire when a process exceeds its time slice.This interrupt ensures that the scheduler will gain control to perform a context switch. • Interrupt Handling Modern architectures are interrupt driven.This means that if the CPU requests data from a disk, for example, it does not need to busy-wait until the read is over, it can issue the request and continue with some other execution. When the read is over, the CPU can be interrupted and presented with the read. For interrupts, a program called an interrupt handler that handles the interrupt from the disk. When an interrupt...

Words: 991 - Pages: 4

Operating Systems

... Troubleshooting Operating Systems Arron CIS/296 Febuary 15, 2016 Steven Kernan Troubleshooting Operating Systems I have recently started in a new technical support role within the IT department of a major manufacturing organization. I am going to go through two scenarios in which I will help callers with problems occurring while using Windows XP and Windows Vista. The organization I am a part of doesn’t have a standard operating system in use. There are numerous products and versions in use across the whole company. I am going to discuss which of the operating systems I would recommend that the company makes standard between Windows XP and Windows Vista. I will also make a recommendation of which of the operating systems I would replace if I was in charge of the organization. My first scenario is that I receive a call from a user that using a Windows XP operating system and has encountered stability problems. The first thing I am going to do in order to gain more knowledge of the problem at hand is investigate the situation. I need this knowledge so I can properly troubleshoot the problem the user is having with the operating system they are using. The second thing I will do is establish a theory from the information I got from interviewing the user then I will test my theory. If my theory isn’t accurate then I will rethink the problem and figure out what occurring symptoms could be caused by, if my theory is correct I will resolve the problem. Taking preventative......

Words: 1538 - Pages: 7

Aquarius | UPComing Toy Story 4 (2019) | Xiaomi (15)