Bagus' OS202 Page!

Logo

Join my adventure in exploring Operating Systems!

View the Project on GitHub baguspr/os202

HOME


TOP 10 LIST WEEK 02

1. Security Violations
Security violations can be categorized as intentional or accidental. The term intruder, hacker, and attacker are used for those who attempted to breach security.

Types of violations:

2. Program Threats
Attackers usually creates a program that could breach security since it is their common goal.

Common methods that could cause security breaches by programs:

3. Cryptography
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it.

4. User Authentication
User authentication is the verification of an active human-to-machine transfer of credentials required for confirmation of a user’s authenticity.

Types of user authentication:

5. Code Signing
Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. The process employs the use of a cryptographic hash to validate authenticity and integrity.

6. Firewalls
A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls prevent unauthorized internet users from accessing private networks connected to the internet, especially intranets.

7. Sandboxing
Sandboxing is a software management strategy that isolates applications from critical system resources and other programs. It provides an extra layer of security that prevents malware or harmful applications from negatively affecting your system.

8. Access Matrix
A security model of protection state in computer system. It is represented as a matrix. Access matrix is used to define the rights of each process executing in the domain with respect to each object. The rows of matrix represent domains and columns represent objects.

9. Protection Rings
Protection rings are mechanisms to protect data and functionality from faults (by improving fault tolerance) and malicious behaviour (by providing computer security). This approach is diametrically opposite to that of capability-based security

10. System-Call Filter
System call filters are installed to prevent the ability to execute system calls related to forking as a defense mechanism against arbitrary code execution attacks on Elasticsearch. The system call filter check ensures that if system call filters are enabled, then they were successfully installed.