Operating Sys CW2 Blief
Operating Sys CW2 Blief
UNIVERSITY
FACULTY OF SCIENCE & TECHNOLOGY
QUESTION;
A) Explain the security issues of the operating system.
B) What are the differences between windows, Linux, UNIX, and android?
A)
Security issues related to an operating system include vulnerabilities
like buffer overflows, privilege escalation errors, injection flaws, unpatched
software, and zero-day exploits, which can arise from poor programming,
outdated software, or insecure integrations, allowing attackers to gain
unauthorized access or disrupt system functions; other concerns include
insider threats, malware, ransom ware risk, denial of service attacks, rootkits
and backdoors, and compliance issues due to using unsupported operating
systems.
Key points about operating system security issues:
o Vulnerability exploitation:
Hackers can exploit known vulnerabilities in an operating system to gain
access to sensitive data or disrupt system operations.
o Outdated software:
Not updating an operating system to the latest patches can leave it
susceptible to known vulnerabilities.
o Poor access control:
Improper user permissions or weak password management can allow
unauthorized users to access system resources.
o Buffer overflows:
A programming error that allows attackers to write more data to a memory
location than allocated, potentially executing malicious code.
o Privilege escalation:
A vulnerability that allows a user with lower privileges to gain elevated access to the
system.
o Injection flaws:
Allows malicious input to be injected into a system, potentially executing unauthorized
commands.
o Zero-day exploits:
New vulnerabilities that attackers can exploit before a patch is available.
o Insider threats:
Malicious actions by authorized users within an organization, like leaking sensitive
data or inadvertently clicking on phishing links.
o Ransom ware attacks:
Encrypting critical data on a system and demanding a ransom to decrypt it, often
facilitated by vulnerabilities in an outdated operating system.
o Denial of Service attacks:
Flooding a system with traffic to prevent legitimate users from accessing it.