Monday, September 9, 2019

Security Vulnerabilities of an organizations operating system Research Paper

Security Vulnerabilities of an organizations operating system - Research Paper Example These systems have the ability to automatically authenticate, audit, log, or manage their own configurations but they are compliance objects, subject to safeguarding (New York University (ITS), 2010). In this essay, we are going to discuss by analyzing three common ways of preventing operating system attacks or violations concerning their ease of application, their associated management issues, and thereafter rank them in order of their effectiveness. Authentication This is the act of verification of a user’s identity before they can log into a system and be able to execute any programs or do any changes to data in it. Authorization is important in that it keeps away malicious or illiterate users from accessing otherwise vital resources in a computer system therefore preventing potential damage to the computer systems or the data stored inside. In simple terms, it is a means by which a computer system knows that the user trying to log into any of its systems is not a stranger or a malicious subject. Authentication is of multiple ways such as use of passwords in combination with usernames, swiping smart cards, using eye or voice recognition and so on. Identification is crucial in safeguarding integrity, privacy, and availability of any information technology infrastructure or system (Lakshmana, 2007). Advantages In the case of using OS authentication (authentication when first logging into the computer after start up), one does not have to memorize multiple username-password combinations when logging into other databases within the computer but this order is the administrator’s preference (Arcgis Server). It is cheap in the case of the OS authentication where no additional devices or installations are necessary. It is a one-off measure in that once established, the user only has to remember the authorizing credentials. Disadvantages It is an intermediary system security measure, meaning it is somehow prone to bypassing. When using the OS authentica tion and the login combination leaks, then it is easy for the logged-in user to access and interfere with all other systems within the computer system (Arcgis Server). Additional protective mechanisms like voice recognition are quite expensive. Program threat detection An operating system’s kernels and processes perform tasks, as manufacturers’ instructions require of them. A certain command given directs them to do a specific task as per the OS manufacturers’ programming. However, some malicious users (hackers) create programs called program threats that confuse the kernels and processes leading to their malfunction. For instance, there are program threats that destroy operating systems, others alter or destroy data, and others interfere with execution of programs and so on. However, there are measures of preventing and tackling such insecurities such as installing security software, downloading from trusted sites, and regularly updating the operating system (N ew York University (ITS), 2010). Advantages Purchasing and regularly updating trusted security software from recommended manufacturers who understand operating systems gives one peace of mind because single installed security software protects against all the above stated threats in some cases without the user knowing (Stewart, Tittel &

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.