0% found this document useful (0 votes)
3 views11 pages

Os Security

OS security involves measures to protect operating systems from various threats, including malware and unauthorized access. Different operating systems, such as Windows, Linux, Unix, iOS, and Android, have unique security features and challenges. For instance, Windows Security provides real-time protection, while iOS is known for its stringent app review process, and Android's popularity makes it a target for malware due to its open-source nature.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views11 pages

Os Security

OS security involves measures to protect operating systems from various threats, including malware and unauthorized access. Different operating systems, such as Windows, Linux, Unix, iOS, and Android, have unique security features and challenges. For instance, Windows Security provides real-time protection, while iOS is known for its stringent app review process, and Android's popularity makes it a target for malware due to its open-source nature.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

OS SECURITY

OS SECURITY

OS security refers to specified steps or


measures used to protect the OS from threats,
viruses, worms, malware or remote hacker
intrusions. OS security encompasses all
preventive-control techniques, which
safeguard any computer assets capable of
being stolen, edited or deleted if OS security is
compromised.
OS SECURITY
Security refers to providing a protection
system to computer system resources such as
CPU, memory, disk, software programs and
most importantly data/information stored in
the computer system. ... So a computer
system must be protected against
unauthorized access, malicious access to
system memory, viruses, worms etc.
Windows Security

 Windows 10 includes Windows Security, which


provides the latest antivirus protection. Your device
will be actively protected from the moment you
start Windows 10. Windows Security continually
scans for malware (malicious software), viruses, and
security threats. In addition to this real-time
protection, updates are downloaded automatically
to help keep your device safe and protect it from
threats.
Windows Security is a built-in
app available on Windows 10
that provides a user-friendly
interface and tools to manage
common security features. For
example, the experience
includes the Microsoft Defender
Antivirus, which offers real-time
protection for your computer
and data against viruses and
many other kinds of malware.
Linux Security
Linux has multiple advantages when it comes to
security, but no operating system is totally secure.
One issue currently facing Linux is its growing
popularity.
For years, Linux was primarily used by a smaller, more
tech-centric demographic. Now, its increasing use
opens it up to the age-old problem of more users
leading to an increased risk for malware infestations.
Malware already exists that is designed especially for
Linux. Erebus ransomware is one example, and the
Tsunami backdoor has also caused problems for users
over the last few years.
Unix Security
UNIX was created in the 1960s by the AT&T Bell
Labs. Ken Thompson and Dennis Ritchie are the
fathers of UNIX and the commercially available UNIX
OS became available in 1970.

Unix security refers to the means of securing a Unix


or Unix-like operating system. A secure environment
is achieved not only by the design concepts of these
operating systems, but also through vigilant user
and administrative practices.

The UNIX operating system's basic security features


include password protection, access permission,
user profiles, shell scripts, and file ownership.
IOS Security
iOS was designed and created by Apple Inc, it is distributed exclusively for Apple
hardware. iOS protects not only the data stored in the iOS device, but also the
data transmitted on networks when using internet services. iOS provides
advanced and sophisticated security for iOS devices and its also very easy to use.

More stringent controls: It’s more difficult for developers to get apps into the
App Store. That’s because the review process is more stringent. Because of this,
it’s less likely for a malicious app to sneak into Apple’s store.

Less flexibility: Apple doesn’t allow the owners of its devices to modify its iOS
operating system or custom ROMs to be loaded on their devices. That makes the
system more secure since Apple controls the complete experience. Jailbreaking
opens new capabilities on the devices such as changing digital-assistant Siri’s
voice, if you do this, Apple won’t provide support to such devices.

A less tempting target: Because the iOS operating system powers fewer mobile
devices, hackers don’t target the system as often. This makes sense: Hackers and
cybercriminals can ensure more victims if they focus more of their attacks on the
more popular Android operating system.
Android Security

Android is a mobile operating system based on a modified version of the


Linux kernel and other open source software, designed primarily for
touchscreen mobile devices such as smartphones and tablets.

It was unveiled in November 2007, with the first commercial Android


device, the HTC Dream, being launched in September 2008.
Android Security
Popularity: The Android operating system is hugely popular. This means that
developers are constantly building new apps designed to run on the system. Mostly,
the problem comes when hackers create apps designed to infect your mobile
devices. One of the main issues is that the end user can go into a Android device
and enable the installation of software from Unknown Sources, this means that you
can install software on the Android device that does not come from the Google Play
Store.

Open source: Android owners can modify the source code of their Android devices.
This appeals to users who want the flexibility to change the way their mobile
devices run. But it can also make Android devices vulnerable to attacks. When
altering their device’s source code, users could accidentally leave an opening for
cybercriminals.

Fragmented: Unlike the iOS operating system that only runs on Apple-branded
products, the Android operating system runs on mobile devices manufactured by a
host of companies. Some companies might provide hardware that is more secure
than others. Moreover, the manufacturer of the device can use a custom ROM or
base operating system that has software installed that cannot be easily removed or
analyzed for malicious intent.
Thank you!

You might also like