Essays24.com - Term Papers and Free Essays
Search

Operating System Defense

Essay by   •  June 3, 2016  •  Research Paper  •  2,086 Words (9 Pages)  •  1,124 Views

Essay Preview: Operating System Defense

Report this essay
Page 1 of 9

Operating system defense means the apparatus for regular admission of courses,

procedures or workers to the capitals demarcated by the computer scheme. The defense

actions or apparatuses safeguard the implementation of a confident procedures. This

procedure is recognized in several ways; through- system strategy, system administration and

user defined. A computer scheme is an assortment of progressions and substances each of

which has an exclusive designation and can be retrieved through a well-defined set of

operations. Though, there are dissimilar events which are occupied to defend the operating

system so that it can defend from malicious attacks and/or various unwelcomed circumstances

connected with user data safety and security. I have debated here some of the defense events

and their comparative advantages and disadvantages.

This essay is going to inform and discuss the advantages and disadvantages of three

measures that are used to protect operating systems. It will also discuss how a system can

contrivance security and how those measures will rank. These measures will be essential to

protect a company’s operating system. The first being network security meaning, the

authorization of access to data in a network, which is controlled by the network administrator.

Users are assigned an ID and password that allows them access to information and programs

within their authority. Physical and personal security measures are slightly comparative to

defending the safety procedures for functioning operating systems present on the network.

In network security measures there are three major security measures. The first being an

antivirus measure which is software designed to detect and destroy computer viruses. The

second measure would be firewall, which is a system designed to prevent unauthorized access

to or from a private network. The third will be making sure the operating system is up to date.


Every system must maintain and operating system in order to work correctly. Within the

operating system, it can manage a computer’s resources, schedule several tasks for execution

and can maintain the flow of data. There are several different types of operating systems that

are available such as Microsoft windows operating system, UNIX, Linux etc. Mac’s has its own

operating system that is only for Apple computers and other Apple products. “Corporations are

applying safety measures to protect hardware, software, and information, such as antivirus,

firewalls, encryptions, password protection, hardening operating systems, hardening network

operating systems, hardening network devices, and employee’s awareness decreased

vulnerabilities and security breaches.” (Ciampa 2005)

Operating systems are obtainable with great structures than before in order to defend them

from safety weaknesses. Security is more improved by consuming firewalls, archive admissions

with protected coatings with several abilities of facilities and mechanisms of an operating

system security surroundings. There are several more ways that a system can be protected by

an antivirus software. A system can run the software while starting up, and also software that

can contain be recycled after transporting statistics on the internet so that encoded

information can be transferred.

There are diverse actions that are engaged to guard an operating system from security

weaknesses. The security weaknesses is a threat linked to an operating system and memory

administration such as captivating command of an entire scheme by a Trojan horse package

and War Driving etc. With a War Driving scenario, the only requirement of a device like a

laptop or tablet to harm the virtuousness, then what happens is the program only moves


everywhere until the program finds a defenseless wireless signal. Hackers will note the wireless

information such as the id, as well as the actual physical address and formerly post it in

databases so that essentially others will distinguish where there is an unsecured network. The

subsequent actions are occupied to defend them from security vulnerabilities.

The first task that is occupied by each establishment is to defend the network

operating system. The newest obtainable operating system has inherent structures to protect

the operating system from dangers. Corporations that change operating system software such

as Microsoft will make new forms every few years. The main of producing new versions of

operating system every few years is to fix the newest procedural structures as they deliver the

latest security protection to their users. Secondly the newest anti-virus software is installed on

each system that defends the organization from different viruses, worms, and Trojan horses.

Also antivirus software that is installed is arranged to send e-mails and records as they are

transferred from the Internet. Several information technology administrations like Symantec,

McAfee and Norton have unconfined their anti-virus software to stop spyware. Free varieties of

AVG antivirus is also obtainable for private and noncommercial users.

Corporations install one or more firewalls to retain their operating system and network

protected. A firewall is a package that averts unlawful usage and admission to a processor.

Hardware firewalls distribute a solid notch of defense from most methods of outbreaks coming

after the external networks and can be purchased as a stand-alone product or in broadband

routers.


If an operating system has the latest system software, then the system is less likely to be

attacked due to any vulnerabilities. Also when modernizing features, every incremental version

of an operating system contains corrections which were not current in preceding or old

versions. These typically are the imperfections which are current in the operating system as

vulnerabilities. We can effortlessly say that these are the flaws in an operating system that can

permit an interruption into the organization such as a malware or virus. Operating system

...

...

Download as:   txt (14.8 Kb)   pdf (158 Kb)   docx (15.2 Kb)  
Continue for 8 more pages »
Only available on Essays24.com