Types of Threats
Types of Threats
There are mainly two types of threats that occur. These are as follows:
Program threats
The operating system's processes and kernel carry out the specified task as directed. Program
Threats occur when a user program causes these processes to do malicious operations. The common
example of a program threat is that when a program is installed on a computer, it could store and transfer
user credentials to a hacker. There are various program threats. Some of them are as follows:
1.Virus - A virus may replicate itself on the system. Viruses are extremely dangerous and can modify/delete
user files as well as crash computers. A virus is a little piece of code that is implemented on the system
program. As the user interacts with the program, the virus becomes embedded in other files and programs,
potentially rendering the system inoperable.
2. Trojan Horse - This type of application captures user login credentials. It stores them to transfer them to
a malicious user who can then log in to the computer and access system resources.
3. Logic Bomb - A logic bomb is a situation in which software only misbehaves when particular criteria are
met; otherwise, it functions normally.
4. Trap Door - A trap door is when a program that is supposed to work as expected has a security
weakness in its code that allows it to do illegal actions without the user's knowledge.
System Threats
System threats are described as the misuse of system services and network connections to cause
user problems. These threats may be used to trigger the program threats over an entire network, known as
program attacks. System threats make an environment in which OS resources and user files may be
misused. There are various system threats. Some of them are as follows:
1. Port Scanning - It is a method by which the cracker determines the system's vulnerabilities for an attack.
It is a fully automated process that includes connecting to a specific port via TCP/IP. To protect the
attacker's identity, port scanning attacks are launched through Zombie Systems, which previously
independent systems now serve their owners while being utilized for such terrible purposes.
2. Worm - The worm is a process that can choke a system's performance by exhausting all system
resources. A Worm process makes several clones, each consuming system resources and preventing all
other processes from getting essential resources. Worm processes can even bring a network to a halt.
3. Denial of Service - Denial of service attacks usually prevent users from legitimately using the system. For
example, if a denial-of-service attack is executed against the browser's content settings, a user may be
unable to access the internet.
Threats to Operating System
There are various threats to the operating system. Some of them are as follows:
Malware: It contains viruses, worms, trojan horses, and other dangerous software. These are generally
short code snippets that may corrupt files, delete the data, replicate to propagate further, and even crash a
system. The malware frequently goes unnoticed by the victim user while criminals silently extract important
data.
Network Intrusion: Network intruders are classified as masqueraders, misfeasors, and unauthorized users.
A masquerader is an unauthorized person who gains access to a system and uses an authorized person's
account. A misfeasor is a legitimate user who gains unauthorized access to and misuses programs, data, or
resources. A rogue user takes supervisory authority and tries to evade access constraints and audit
collection.
Buffer Overflow: It is also known as buffer overrun. It is the most common and dangerous security issue of
the operating system. It is defined as a condition at an interface under which more input may be placed into
a buffer and a data holding area than the allotted capacity, and it may overwrite other information. Attackers
use such a situation to crash a system or insert specially created malware that allows them to take control
of the system.