Page 299 - DCAP103_Principle of operating system
P. 299

Principles of Operating Systems



                   Notes         Even once better protocols are in hand, convincing the world to accept them represents its own
                                 set of headaches. No central governing body rules the Internet, and standards bodies have been
                                 ineffective at getting parties to adopt adequate security specifications. The situation is further
                                 complicated by the fact that national governments differ in their views of how the Internet
                                 should be run, and many key Internet players argue against any government intervention at all.
                                 What  is  clear  is  that  cybersecurity  deserves immediate,  sustained  attention.  As  noted  in  the
                                 PITAC report, “the IT infrastructure of the U.S. is highly vulnerable to terrorist and criminal
                                 attacks. It is imperative that we take action before the situation worsens and the cost of inaction
                                 becomes even greater.”


                                                Operating systems provide the fundamental mechanisms for securing
                                                computer  processing.  Since  the  1960s,  operating  systems  designers  have
                                                explored how to build “secure” operating systems.

                                 9.3 Program Threats


                                 Threats originated from viruses, which are strictly speaking programs that replicate themselves
                                 without your knowledge. The earliest known viruses were simply annoying, appearing as a
                                 MS-DOS  program  in  folders  of  infected  computers,  transferred  through  floppy  disks.  They
                                 became dangerous when these viruses started to spoof and infect valid files. With the advent
                                 of the Internet, viruses further evolved into worms that spread through networks. Worms not
                                 only propagate themselves, but also “carry” other malicious files in them, such as Trojan horses,
                                 which drop malicious files in computers.



                                                Threats make affected the system.



                                 9.3.1 Types of Threats
                                 Worms: This malicious program category largely exploits operating system vulnerabilities to
                                 spread itself. The class was named for the way the worms crawl from computer to computer,
                                 using networks and e-mail. This feature gives many worms a rather high speed in spreading
                                 themselves.
                                 Viruses: Programs that infected other programs, adding their own code to them to gain control
                                 of  the  infected  files  when  they  are  opened.  This  simple  definition  explains  the  fundamental
                                 action performed by a virus-infection.
                                 Trojans: Programs that carry out unauthorized actions on computers, such as deleting information
                                 on drives, making the system hang, stealing confidential information, etc. This class of malicious
                                 program is not a virus in the traditional sense of the word (meaning it does not infect other
                                 computers or data). Trojans cannot break into computers on their own and are spread by hackers,
                                 who disguise them as regular software. The damage that they incur can exceed that done by
                                 traditional virus attacks by several fold.
                                 Spyware: Software that collects information about a particular user or organization without
                                 their knowledge. You might never guess that you have spyware installed on your computer.
                                 Riskware: Potentially dangerous applications include software that has not malicious features
                                 but could form part of the development environment for malicious programs or could be used
                                 by hackers as auxiliary components for malicious programs.
                                 Rootkits: Utilities used to conceal malicious activity. They mask malicious programs to keep



        292                               LOVELY PROFESSIONAL UNIVERSITY
   294   295   296   297   298   299   300   301   302   303   304