Operating System Defense
Essay by chitown4eva88 • June 3, 2016 • Research Paper • 2,086 Words (9 Pages) • 1,124 Views
Operating system defense means the apparatus for regular admission of courses,
procedures or workers to the capitals demarcated by the computer scheme. The defense
actions or apparatuses safeguard the implementation of a confident procedures. This
procedure is recognized in several ways; through- system strategy, system administration and
user defined. A computer scheme is an assortment of progressions and substances each of
which has an exclusive designation and can be retrieved through a well-defined set of
operations. Though, there are dissimilar events which are occupied to defend the operating
system so that it can defend from malicious attacks and/or various unwelcomed circumstances
connected with user data safety and security. I have debated here some of the defense events
and their comparative advantages and disadvantages.
This essay is going to inform and discuss the advantages and disadvantages of three
measures that are used to protect operating systems. It will also discuss how a system can
contrivance security and how those measures will rank. These measures will be essential to
protect a company’s operating system. The first being network security meaning, the
authorization of access to data in a network, which is controlled by the network administrator.
Users are assigned an ID and password that allows them access to information and programs
within their authority. Physical and personal security measures are slightly comparative to
defending the safety procedures for functioning operating systems present on the network.
In network security measures there are three major security measures. The first being an
antivirus measure which is software designed to detect and destroy computer viruses. The
second measure would be firewall, which is a system designed to prevent unauthorized access
to or from a private network. The third will be making sure the operating system is up to date.
Every system must maintain and operating system in order to work correctly. Within the
operating system, it can manage a computer’s resources, schedule several tasks for execution
and can maintain the flow of data. There are several different types of operating systems that
are available such as Microsoft windows operating system, UNIX, Linux etc. Mac’s has its own
operating system that is only for Apple computers and other Apple products. “Corporations are
applying safety measures to protect hardware, software, and information, such as antivirus,
firewalls, encryptions, password protection, hardening operating systems, hardening network
operating systems, hardening network devices, and employee’s awareness decreased
vulnerabilities and security breaches.” (Ciampa 2005)
Operating systems are obtainable with great structures than before in order to defend them
from safety weaknesses. Security is more improved by consuming firewalls, archive admissions
with protected coatings with several abilities of facilities and mechanisms of an operating
system security surroundings. There are several more ways that a system can be protected by
an antivirus software. A system can run the software while starting up, and also software that
can contain be recycled after transporting statistics on the internet so that encoded
information can be transferred.
There are diverse actions that are engaged to guard an operating system from security
weaknesses. The security weaknesses is a threat linked to an operating system and memory
administration such as captivating command of an entire scheme by a Trojan horse package
and War Driving etc. With a War Driving scenario, the only requirement of a device like a
laptop or tablet to harm the virtuousness, then what happens is the program only moves
everywhere until the program finds a defenseless wireless signal. Hackers will note the wireless
information such as the id, as well as the actual physical address and formerly post it in
databases so that essentially others will distinguish where there is an unsecured network. The
subsequent actions are occupied to defend them from security vulnerabilities.
The first task that is occupied by each establishment is to defend the network
operating system. The newest obtainable operating system has inherent structures to protect
the operating system from dangers. Corporations that change operating system software such
as Microsoft will make new forms every few years. The main of producing new versions of
operating system every few years is to fix the newest procedural structures as they deliver the
latest security protection to their users. Secondly the newest anti-virus software is installed on
each system that defends the organization from different viruses, worms, and Trojan horses.
Also antivirus software that is installed is arranged to send e-mails and records as they are
transferred from the Internet. Several information technology administrations like Symantec,
McAfee and Norton have unconfined their anti-virus software to stop spyware. Free varieties of
AVG antivirus is also obtainable for private and noncommercial users.
Corporations install one or more firewalls to retain their operating system and network
protected. A firewall is a package that averts unlawful usage and admission to a processor.
Hardware firewalls distribute a solid notch of defense from most methods of outbreaks coming
after the external networks and can be purchased as a stand-alone product or in broadband
routers.
If an operating system has the latest system software, then the system is less likely to be
attacked due to any vulnerabilities. Also when modernizing features, every incremental version
of an operating system contains corrections which were not current in preceding or old
versions. These typically are the imperfections which are current in the operating system as
vulnerabilities. We can effortlessly say that these are the flaws in an operating system that can
permit an interruption into the organization such as a malware or virus. Operating system
...
...