StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Protecting Operating Systems, Security Vulnerabilities - Essay Example

Cite this document
Summary
The paper "Protecting Operating Systems, Security Vulnerabilities" highlights that different classifications of system criticality define what security measure best caters to a specific security need. Some measures, like the basic securities, are general and apply across all three classes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Protecting Operating Systems, Security Vulnerabilities
Read Text Preview

Extract of sample "Protecting Operating Systems, Security Vulnerabilities"

? Protecting Operating Systems Introduction Vulnerabilities are security holes affecting software that weaken the security ofa computer system or its network. They are also malfunctions coming about because of incorrect security or general computer configurations and both of these pose threats of damage to the computer system or loss of critical data. However, there are several modes of preventing and reversing such threats once they occur, differing in their effectiveness to secure or restore the normal functioning of an affected computer or computer system. In this case, a computer or computer system referring to personal computers, servers, network server applications, web applications, and databases that run on operating systems. These systems have the ability to automatically authenticate, audit, log, or manage their own configurations but they are compliance objects, subject to safeguarding (New York University (ITS), 2010). In this essay, we are going to discuss by analyzing three common ways of preventing operating system attacks or violations concerning their ease of application, their associated management issues, and thereafter rank them in order of their effectiveness. Authentication This is the act of verification of a user’s identity before they can log into a system and be able to execute any programs or do any changes to data in it. Authorization is important in that it keeps away malicious or illiterate users from accessing otherwise vital resources in a computer system therefore preventing potential damage to the computer systems or the data stored inside. In simple terms, it is a means by which a computer system knows that the user trying to log into any of its systems is not a stranger or a malicious subject. Authentication is of multiple ways such as use of passwords in combination with usernames, swiping smart cards, using eye or voice recognition and so on. Identification is crucial in safeguarding integrity, privacy, and availability of any information technology infrastructure or system (Lakshmana, 2007). Advantages In the case of using OS authentication (authentication when first logging into the computer after start up), one does not have to memorize multiple username-password combinations when logging into other databases within the computer but this order is the administrator’s preference (Arcgis Server). It is cheap in the case of the OS authentication where no additional devices or installations are necessary. It is a one-off measure in that once established, the user only has to remember the authorizing credentials. Disadvantages It is an intermediary system security measure, meaning it is somehow prone to bypassing. When using the OS authentication and the login combination leaks, then it is easy for the logged-in user to access and interfere with all other systems within the computer system (Arcgis Server). Additional protective mechanisms like voice recognition are quite expensive. Program threat detection An operating system’s kernels and processes perform tasks, as manufacturers’ instructions require of them. A certain command given directs them to do a specific task as per the OS manufacturers’ programming. However, some malicious users (hackers) create programs called program threats that confuse the kernels and processes leading to their malfunction. For instance, there are program threats that destroy operating systems, others alter or destroy data, and others interfere with execution of programs and so on. However, there are measures of preventing and tackling such insecurities such as installing security software, downloading from trusted sites, and regularly updating the operating system (New York University (ITS), 2010). Advantages Purchasing and regularly updating trusted security software from recommended manufacturers who understand operating systems gives one peace of mind because single installed security software protects against all the above stated threats in some cases without the user knowing (Stewart, Tittel & Chapple, 2011). Installation happens once and the maintenance costs are insignificant. Disadvantages In case of outdated security software, threats penetrate the computer system without the user’s knowledge causing extensive damage or loss. Some OS manufacturers create threats themselves that by-pass any security software in a bid to make profits by introducing ‘tougher security software’. It is therefore unwise to trust in such software a hundred percent (Krishna, 2003). Security partitioning This mode of protection works by grouping systems with similar hardware, resource properties, and security requirements. The similarities can be character, size, file extensions firewall profiles and other classifiable aspects and by grouping them together, it is easy to recognize a foreign file, system or connection trying to invade this similar-trait group. This allows for analyzing and categorizing of the invader as either safe or malicious where protective mechanisms like security software restrict execution or invasion by the foreign character (Abraham, Greg, & Galvin, 2013). Advantages It is the most advanced form of computer system security. By storing frequently accessed or more vulnerable systems or files in partitions separate from the disk with the installation of the operating system, an attack would not harm the operating system. A single access credential to similar-trait systems stored in a partition of their own allows the administrator to manage several systems from one end. In case of invasion to one partition, the other partitions set apart remain intact, preventing total damage, violation, or loss (Krishna, 2003). Disadvantages It only supports systems of highly critical nature. Some threats are capable of assuming other file extensions or properties and are mistaken for the genuine files or systems. It is therefore not a hundred percent protective. Sorting systems by properties to enable similar grouping is tedious and can be inaccurate. Software installation is possible only on the partition containing the operating system, therefore, it is possible for malicious software to invade and violate the operating system when the user unconsciously installs such software (Stewart, Tittel & Chapple, 2011). Ease of Implementation Implementations of the above measures vary slightly from each other with the variations caused by the preference by the user in intensifying them. All of these measures have basic and advanced tags with their effectiveness of protecting the operating system directly increasing with advancement of the measure in use. For instance, basic OS authentication comes with every Windows operating system. Voice, fingerprint scan or iris detection as an authentication feature is a preference of the user as it is very rare to have an operating system offering such as a basic feature. Such advancements mean extra and at times expensive spending but if the system or data’s sensitivity is worth the cost, then some users do not mind it (Stewart, Tittel & Chapple, 2011). Installation of security software is similar to any other installation, and for any computer-literate user who understands an operating system or the harm insecurities can cause, then installing it is a minute task. Concisely, implementing these two measures requires basic computer knowledge unlike partitioning that is a bit complex in implementing. Security partitioning requires a little advanced computer expertise due to the complexity of grouping files with similar properties and that is a potential challenge for a basic user (Abraham, Greg, & Galvin, 2013). However, it is logical that anyone concerned with operating system security matters knows the basics of partitioning and file categorizing. In the event that this is not the case, for instance, an organization requires this done for them; they can always buy the services of an expert to do it for them (Krishna, 2003). In concluding the issue over the ease of implementing these measures with regard to the discussion appearing above, one can easily tell that protecting an operating system or vital data stored is not out of reach, and the few instances of system failures is a responsibility of human ignorance. Associated management issues Lakshmana (2007) recommends a user to consider some criteria before implementing any system security protective measures. The major considerations being cost, effectiveness, strategic fit, scalability, and management support. In the case of authentication, once the user establishes the secret credentials for the first time, it protects the computer system for as long as they wish that is if they are careful enough not to leak their credentials. When using password-username combination credentials, no charges incur but for the advanced authentication methods such as swipe cards, the user has to buy additional hardware. Just like advancing the basic login method that comes with windows to complex ones, security software requires regular maintenance and correct configuration for better performance. It is likely for recommended security software to cost more, but it obviously works better than free or cheaper software. Updating requires good quality internet connection whereas configuration means setting the software to scan automatically, detect, destroy, or restrict malicious files or unknown incoming connections. Apart from the updating and configuration part, which is in most cases automatic after installation of the software, no further expenditure or maintenance is required. Partitioning demands regular updates in system formats or file extensions because of the ever-evolving world of technology. The updates incorporate and ensure that new versions of files or systems do not appear as threats and prevent harmful files from assuming formats of safe files (Abraham, Greg, & Galvin, 2013). This is the only measure that demands constant user presence or in some cases expenditure for maintenance. Once a user initiates the measures of protecting their vital systems and sources, it becomes a constant and repetitive responsibility to keep them confidential, genuine, and up-to-date. It may scare some users off but is not practical to compare the cost of re-installing faulty operating systems or replacing dead systems after invasion and damage to the one-off costs of buying security software, access controls, or regular maintenance (Stewart, Tittel & Chapple, 2011). Order of ranking in accordance to effectiveness According to Abraham, Greg, & Galvin (2013), there are three categories of system security measures: basic, intermediate and advanced. Their classification is as per the level of system criticality they protect and that can be low, medium, or high. Basic system security measures are the general measures that apply to all systems regardless of their level of system classification. They are the very basic and mandatory for all systems, and the only ones applicable to personal computers. Due to their limited protection or inferiority, they are easy to by-pass and therefore do expose the systems to violations somehow. Such systems require password protection, software updates, firewalls, and malware protection to mention just a few (tutorialspoint). These characteristics directly define program threat detection security measures; it is therefore a basic system security measure. Intermediate system security measures protect systems that are of medium criticality to those of high criticality, and these will only apply to personal workstations and laptops under specific special conditions. These characteristics therefore refer to physical access control measures, potential risk reporting, and authentication (Abraham, Greg, & Galvin, 2013). Authentication is therefore an intermediate system security protection measure. By use of elimination, we remain with security partitioning. In support of partitioning as an advanced system security measure, we define advanced measures as those that apply specifically to the highly critical computer systems. In addition to security partitioning, there is audit and accountability, maintenance and configuration falling under advanced computer system security measures (New York University (ITS), 2010). Conclusion It is lame to blame the modern day operating systems for the failures we see affecting our computer systems as their manufacturers make them in the most sophisticated ways than ever, further adding multiple features in them. According to Krishna (2003), approximately a semi of all security violations we experience today are as a result of either improperly configured, unverified or rarely monitored operating systems meaning they are left vulnerable to attacks because they contain the very default settings their manufacturers set in them. It is notable from the discussion that different classifications of system criticality define what security measure best caters for a specific security need. Some measures, like the basic securities, are general and apply across all the three classes. Some, like the advanced system security measures are specifically for highly critical systems (New York University, 2010). While it seems like protecting computer systems is tedious, costly, or maybe ineffective in some cases, it is advisable not to take the risks as the loss occurring or data being lost is replaceable is overly above what is otherwise recommended for acquiring and maintaining them. References Abraham, S., Greg G. & Galvin, P. B. (2013). Operating System Concepts, Seventh Edition, Chapter 15. Retrieved on October 18, 2013 from http://www.cs.uic.edu/~jbell/CourseNotes/OperatingSystems/15_Security.html Arcgis Server. Operating System Authentication. Retrieved on October 18, 2013 from http://webhelp.esri.com/arcgisserver/9.3/java/index.htm#geodatabases/operati1778508573.htm Krishna, A. (2003). Steps to a Secure Operating System. Retrieved on October 18, 2013 from http://www.computerworld.com/s/article/82969/Steps_to_a_secure_operating_system Lakshmana, R. V. (2007). What Is Authentication? Retrieved on October 18, 2013 from http://www.theiia.org/intAuditor/itaudit/archives/2007/may/what-is-authentication/ New York University Information Technology Services (ITS) (2010). Data and System Security Measures. Retrieved on October 18, 2013 from http://www.nyu.edu/its/policies/sec_datasys.html Stewart, J. M., Tittel, E., & Chapple, M. (2011). CISSP: Certified Information Systems Security Professional Study Guide. Indianapolis, Ind: Wiley Pub. Tutorialspoint.com. Operating System – Security. Retrieved on October 18, 2013 from http://www.tutorialspoint.com/operating_system/pdf/os_security.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Vulnerabilities of an organizations operating system Research Paper”, n.d.)
Security Vulnerabilities of an organizations operating system Research Paper. Retrieved from https://studentshare.org/information-technology/1488437-security-vulnerabilities-of-an-organizations
(Security Vulnerabilities of an Organizations Operating System Research Paper)
Security Vulnerabilities of an Organizations Operating System Research Paper. https://studentshare.org/information-technology/1488437-security-vulnerabilities-of-an-organizations.
“Security Vulnerabilities of an Organizations Operating System Research Paper”, n.d. https://studentshare.org/information-technology/1488437-security-vulnerabilities-of-an-organizations.
  • Cited: 0 times

CHECK THESE SAMPLES OF Protecting Operating Systems, Security Vulnerabilities

Network Vulnerabilities:

This research will summarize 10 common network vulnerabilities into a table.... Most of people make use of them to copy their sensitive information from one system to another and use it NETWORK vulnerabilities Network vulnerabilities Affiliation Introduction This paper presents an overview of some of the common network vulnerabilities.... This research will summarize 10 common network vulnerabilities into a table....
2 Pages (500 words) Essay

Information Systems Security

The paper "Information systems security" concerns such security systems as PIN numbers, key card accesses, and passwords that could be easily stolen and hacked.... The information systems are exposed to widespread risks, threats, and vulnerabilities that can adversely impact the IT work processes.... The report provides an overview of risks and vulnerabilities of the information system (IS) in the pharmacy.... Potential physical vulnerabilities and threatsThe information systems comprise of computer hardware, peripherals and networking systems....
8 Pages (2000 words) Essay

Threats And Vulnerabilities Analysis

The essay "Threats And vulnerabilities Analysis" analyzes threats and vulnerabilities that the organization is likely to face.... This way, there will be proper engineering of the system's operation thereby avoiding vulnerabilities such as poor administrative procedures.... The top management is responsible for documenting and overseeing implementation of an Information security plan.... hellip; The following section lists a number of policy statements that give the narration of the information security controls that could be used by the institution to implement recommendations for protection....
6 Pages (1500 words) Coursework

Vulnerabilities in Microsoft Windows Server, IAAS

It is a brand name given to bundle of server operating systems, which are launched by Microsoft.... This study "vulnerabilities in Microsoft Windows Server, IAAS" reflects upon various aspects of cloud computing and certain vulnerabilities faced by its applications or technologies.... This study shall analyse key vulnerabilities witnessed by Windows Server and mitigation strategies implemented over the years....
10 Pages (2500 words) Essay

Identifying Threats and Vulnerabilities to Computer

The study "Computer Security" concerns an example of how security lapses can occur and expose the system's vulnerabilities.... This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken.... ne of the oldest definitions for security is that it is the process whereby steps are taken to minimize vulnerabilities of assets and resources.... he case study provides an example of how security lapses can occur and expose the system's vulnerabilities....
6 Pages (1500 words) Report

Security Awareness Training Plan for MEMATECH Solutions Limited

The paper "security Awareness Training Plan for MEMATECH Solutions Limited " discusses that the continuous monitoring process of the physical access would enable the system administrators to implement various procedural controls over each access point of the 'Physical security Perimeter(s)'.... hellip; Maintenance and Testing of the Physical security process would provide adequate support to the agency to efficiently execute appropriate maintenance programs....
6 Pages (1500 words) Case Study

Microsoft Windows 7 Security Best Practices and Vulnerabilities

The basic objective of this research is to discuss the best practices and vulnerabilities of Microsoft Windows 7 operating system.... hellip; This paper has discussed the best practices of the Windows 7 Operating System and also some vulnerabilities of this system.... While in the second section some of the vulnerabilities of Windows 7 OS are highlighted, where a number of holes existing in the Windows 7 OS are discussed from.... Along with the efficiency of these features, there exist some vulnerabilities as well, like remote attackers can easily attack, and local users can achieve privileges using crafted applications (CVeDetails, 2014)....
11 Pages (2750 words) Research Paper

Current Trends in Information Security

The paper "Current Trends in Information security" examines the significant current threats to information security and the most important controls that WebCenter should be considered as a priority to mitigate the risks of these threats being realized.... hellip; The primary objectives of information security are; integrity, confidentiality, and availability.... Current threats to information security The two major threats to information security include; phishing and hackingPhishingPhishing, also known as “carding” or “brand spoofing,” refers to a form of social engineering where an attacker, known as a phisher, deceptively retrieves data of a legitimate user's confidential information by copying electronic communications from an organization in an automated manner (Shi and Saleem 2012)....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us