OS Theory
OS Theory
With the increasing number of cybercrimes with every passing day, individuals and
companies must secure their information.
A firewall is one such security device that can help you safeguard your network and
device from an outsider.
Firewalls are network security systems. They are a vital component of network
security.
Assignment:
Difference Between a Firewall and Antivirus? Also Explain the Algorithm of an Avast
Antivirus? Also draw the system architecture diagram?
Starvation:
Starvation occurs when one or more threads in your program are blocked from gaining
access to a resource and, as a result, cannot make progress.
Starvation is the problem that occurs when low priority processes get jammed for an
unspecified time as the high priority processes keep executing.
The term operating system (OS) security refers to practices and measures that can
ensure the confidentiality, integrity, and availability (CIA) of operating systems.
Malware
Malware is short for malicious software, which encompasses a range of attack
vectors such as viruses, worms, trojans, and rootkits. Malware is injected into a
system without the owner’s consent,
A worm a type of malware that is designed to replicate itself and spread across
networks to infect multiple computers. The payload of the worm may vary
significantly, anything such as deleting files, installing backdoors, stealing
information, using up network bandwidth, and installing additional malware
Network Intrusion:
Network intrusion occurs when an individual gains access to a system for improper
use.
---------------------------------------------
Authentication Measures of OS:
Authentication involves matching an identified user with the programs or data they
are allowed to access. All operating systems have controls that can be used to
verify that users who run a particular program are authorized to do so.
You can use the following techniques to authenticate users at the operating system
level:
Security keys: keys are provided by a key generator, usually in the form of a
physical dongle. The user must insert the key into a slot in the machine to log in.
Assignment: What are Torjan Horse and DoS attacks? How do they attack in systems?
Why Clouds:
FaceBook DC:
https://www.youtube.com/watch?v=_r97qdyQtIk