In: Computer Science
Desktop and Server OS Vulnerabilities
a long and comprehensive explanation by typing please
1.IDENTIFY SPECIFIC VULNERABILITIES AND EXPLAIN WAYS TO FIX THEM
2.EXPLAIN WHAT RED HAT IS OS. TO LINUX WHAT DOES RED HAT DO?
1. Desktop and Server OS Vulnerabilities:
1. Modifications in the code remotely: Attackers can remotely access your code base and can add new piece of code into it such that it can affect or make the entire system vulnerable.
2. Denial of service: This makes your system very slow by putting several malwares into your machine which causes them your machine unable to operate and the attackers takes the benefit of this freeze because we tries to solve those freezes but in between the attackers sends us the malicious programs which becomes the part of our filesystem.
3. Unwanted Privileges: Sometimes we have to give root access to some applications but these one time permissions can lead into serious injury as the attackers uses this one time access and convert them into permanent.
4. Database attacks: Data is most confidential thing and one needs to keep extra security onto it as this can lead to very heavy theft because there are user accounts in the database and they have some set of permissions, subscriptions which they have bought so it becomes more important to secure those data especially those confidetial which attackers can use them in illegal way.
5. Spoofing: This is the common practice for the attackers to make users victims because they spoof you by putting some dummy pages in front of you and you start believing in them but they are actually the fake ones.
Fixing:
You need to setup an extra layer of security in order to secure
your OS or Server which can be done by restricting the users,
preventing unwanted applications, accepting unwanted requests, keep
an eye regularly on which application got which permissions and
enabling the firewall and other security features.
Also using the updated packages and avoid using untrusted package
sources which can be attackers registry.
**********************************************
2. RED HAT OS
It's an operating system that deals with mainly the server
machines for a better security. It is the part of the Linux family
and it was derived from it actually but later it was discontinued
with the Linux and became a separate company.
It builds the server os by keeping the security their first
priority. It's a linux based OS which means it's kernel is not
different from the Linux OS such as Ubuntu, Mint, Fedora etc.
Uses: There are actually mainly applications of the Red Hat in the market such as:
1. Containers
2. Virtualizations
3. Server OS
4. Middleware
5. Automation
6. Application Dev
7. Storage
******************************
I hope it helps.