Types of Threats
Below are tow types of threats.
1. Program threats
Below are some program threats.
- Virus: A virus is a malicious executable code attached to another executable file. The virus spreads when an infected file is passed from system to system. Viruses can be harmless or they can modify or delete data. Opening a file can trigger a virus.
- Trojan Horse: A Trojan horse is malware that carries out malicious operations under the appearance of a desired operation such as playing an online game.
- Logic Bomb: A logic bomb is a malicious program that uses a trigger to activate the malicious code. The logic bomb remains non-functioning until that trigger event happens.
2. System Threats
Below are some system threats.
- Worm: Worms replicate themselves on the system, attaching themselves to different files and looking for pathways between computers, such as computer network that shares common file storage areas.
- Denial of Service: Denial of Service (DoS) is a cyber-attack on an individual Computer or Website with the intent to deny services to intended users. Their purpose is to disrupt an organization’s network operations by denying access to its users.
Operating System Security
Protection refers to a mechanism that controls the access of programs, processes, or users to the resources defined by a computer system. We can take protection as a helper to multiprogramming operating systems so that many users might safely share a common logical namespace such as a directory or files.
Security can be attacked in the following ways:
- Authorization
- Browsing
- Trap doors
- Invalid Parameters
- Line Tapping
- Electronic Data Capture
- Lost Line
- Improper Access Controls
- Waste Recovery
- Rogue Software