OS 8 Nov Protection & Security in OS
OS 8 Nov Protection & Security in OS
OS 8 Nov Protection & Security in OS
Virus: Viruses are generally small snippets of code embedded in a system. They are very
dangerous and can corrupt files, destroy data, crash systems etc. They can also spread further by
replicating themselves as required.
Trojan Horse: A trojan horse can secretly access the login details of a system. Then a malicious
user can use these to enter the system as a harmless being and wreak havoc.
Trap Door: A trap door is a security breach that may be present in a system without the
knowledge of the users. It can be exploited to harm the data or files in a system by malicious
people.
Worm: A worm can destroy a system by using its resources to extreme levels. It can generate
multiple copies which claim all the resources and don't allow any other processes to access
them. A worm can shut down a whole network in this way.
Denial of Service: These type of attacks do not allow the legitimate users to access a system. It
overwhelms the system with requests so it is overwhelmed and cannot work properly for other
user.
Protection & Security Methods
The different methods that may provide protect and security for different computer systems are −
• Authentication
This deals with identifying each user in the system and making sure they are who they claim to be. The
operating system makes sure that all the users are authenticated before they access the system. The different
ways to make sure that the users are authentic are:
• Username/ Password
Each user has a distinct username and password combination and they need to enter it correctly before they can
access the system.
• User Key/ User Card
The users need to punch a card into the card slot or use they individual key on a keypad to access the system.
• User Attribute Identification
Different user attribute identifications that can be used are fingerprint, eye retina etc. These are unique for each
user and are compared with the existing samples in the database. The user can only access the system if there is
a match.