Operating System Vulnerabilities

Read Complete Research Material



Operating System Vulnerabilities

Commercial Operating System

Security and Information Systems

Security and control of information systems is very important, however, often overlooked by some companies. Companies have to depend on information system to manager their core business. Once the information system have a security problem, company's information assets like confidential staff information, business secrets, and commercial development plan will be lost.

Risks of Accidents with Information Systems

Many people, particularly in managers assume that information systems will operate as they are designed to work. They assume that the system will work reliably and the information generated will be correct. When these assumptions are proven wrong, the consequences can be disastrous. Alter (1992) argued that there are five types of risks of accidents in information systems.

Computer Security And Windows

Any IT environment is only as secure as its weakest link. Unfortunately, client operating systems are often overlooked during security projects. As the customer's organization plans to implement Microsoft Windows XP Professional, ensure that security is an integral part of the customer's deployment plans.

Although the default installation of Windows XP is quite secure, it is important to bear in mind the trade-offs that exist between security, usability, and the functionality of the clients in the customer's environment (Teneyuca 2001 54). A thorough understanding of these trade-offs places the customer's organization in a position to strengthen the deployment of Windows XP to include a significantly higher level of security than provided by the default installation. The Windows XP Security Guide provides recommendations for deploying Windows XP in three distinct environments. The first and most common of these is an enterprise environment that consists of Windows XP running in a Windows 2004 or Microsoft Windows Server™ 2003 domain. The second consists of Windows XP in a high security environment in which security risk mitigation can be implemented at the highest possible level. Finally, guidance is offered for deploying Windows XP in a stand-alone or unmanaged environment. Information is also provided about the numerous new security options that are available in Windows XP Service Pack 2 (SP2) (Jiang Klein Chen Lin 2002 507).

Linux

Every computer at Thompson Mutual Funds running Linux appears to have a math coprocessor. Of course, if these computer already contains an FPU, it will be used instead of the emulation, and you can even compile your own kernel with math emulation removed, for a small memory gain. Support for many national or customized keyboards. It is fairly easy to add new ones dynamically.

The access controls in the implementation currently support a combination of two, type enforcement and role-based access control. This combination was chosen because together they provide powerful tools to construct useful security policies. The specific policy that is enforced by the kernel is dictated by security policy configuration files which include type enforcement and role-based access control components.

The type enforcement component defines an extensible set of domains and types. Each process has an associated domain, and each object has an associated type (Procaccino Verner Overmyer Darter 2002 53). The configuration files specify how domains are ...
Related Ads