Question

In: Computer Science

Desktop and Server OS Vulnerabilities a long and comprehensive explanation by typing please 1.IDENTIFY SPECIFIC VULNERABILITIES...

Desktop and Server OS Vulnerabilities

a long and comprehensive explanation by typing please

1.IDENTIFY SPECIFIC VULNERABILITIES AND EXPLAIN WAYS TO FIX THEM

2.EXPLAIN WHAT RED HAT IS OS. TO LINUX WHAT DOES RED HAT DO?

Solutions

Expert Solution

1. Desktop and Server OS Vulnerabilities:

1. Modifications in the code remotely: Attackers can remotely access your code base and can add new piece of code into it such that it can affect or make the entire system vulnerable.

2. Denial of service: This makes your system very slow by putting several malwares into your machine which causes them your machine unable to operate and the attackers takes the benefit of this freeze because we tries to solve those freezes but in between the attackers sends us the malicious programs which becomes the part of our filesystem.

3. Unwanted Privileges: Sometimes we have to give root access to some applications but these one time permissions can lead into serious injury as the attackers uses this one time access and convert them into permanent.

4. Database attacks: Data is most confidential thing and one needs to keep extra security onto it as this can lead to very heavy theft because there are user accounts in the database and they have some set of permissions, subscriptions which they have bought so it becomes more important to secure those data especially those confidetial which attackers can use them in illegal way.

5. Spoofing: This is the common practice for the attackers to make users victims because they spoof you by putting some dummy pages in front of you and you start believing in them but they are actually the fake ones.

Fixing:

You need to setup an extra layer of security in order to secure your OS or Server which can be done by restricting the users, preventing unwanted applications, accepting unwanted requests, keep an eye regularly on which application got which permissions and enabling the firewall and other security features.

Also using the updated packages and avoid using untrusted package sources which can be attackers registry.

**********************************************

2. RED HAT OS

It's an operating system that deals with mainly the server machines for a better security. It is the part of the Linux family and it was derived from it actually but later it was discontinued with the Linux and became a separate company.

It builds the server os by keeping the security their first priority. It's a linux based OS which means it's kernel is not different from the Linux OS such as Ubuntu, Mint, Fedora etc.

Uses: There are actually mainly applications of the Red Hat in the market such as:

1. Containers
2. Virtualizations
3. Server OS
4. Middleware
5. Automation
6. Application Dev
7. Storage

******************************

I hope it helps.


Related Solutions

Firewalls & Network Security course FIREWALL BASICS a long and comprehensive explanation by typing please 1.WHAT...
Firewalls & Network Security course FIREWALL BASICS a long and comprehensive explanation by typing please 1.WHAT ARE FIREWALL ENHANCEMENTS? 2.WHAT CONSTITUTES GOOD FIREWALL RULES? Enumeration ENUMERATE WINDOWS OS TARGETS AND SERVICES?
** No need to answer (1) or (2), Please show explanation for (3), with specific calculation...
** No need to answer (1) or (2), Please show explanation for (3), with specific calculation process if needed. Thank you. ** Dudley has a utility function U(C, R) = CR, where R is leisure and C is consumption per day. He has 16 hours per day to divide between work and leisure. Dudley has a non-labor income of $48 per day. (a) If Dudley is paid a wage of $6 per hour, how many hours of leisure will he...
Giva details on explanation too (I.e. NOT just basic knowledge of os) Can you please build...
Giva details on explanation too (I.e. NOT just basic knowledge of os) Can you please build a code for part1 to part8? - After child is forked and process is created, both parent and child are attached with shared memory segment on their address in part1, part2. - Each will go on for 10 iterations to access the shared memory as follows-> on i-th iteration (0<=i<10), the parent will first update the call of a[i]= i. - And let child...
Please be clear in explanation! 1. Define density, mass, weight, and specific gravity. A room is...
Please be clear in explanation! 1. Define density, mass, weight, and specific gravity. A room is 4m wide, 5m long, and 3m high. Air pressure in the room is 110 KPa absolute and the temperature is 27C. Assuming ideal gas behaviour, determine the mass, density, and specific gravity of the air using water as reference density. (The density of water is 1000kgm-3, the molar mass of air is 29g/mol, and R=8.314 J/(kg mol)). Let the minimum fresh air requirement for...
word typing, please. make it long and with examples. Q1. What is the Concept of One-Way...
word typing, please. make it long and with examples. Q1. What is the Concept of One-Way ANOVA; assumptions, when to use it, and its applications? Q2. what is the concept of Parametric vs NonParametric
Please give a good explanation and a comprehensive answer. Where in the asphalt layer, would you...
Please give a good explanation and a comprehensive answer. Where in the asphalt layer, would you expect to find a tension crack forming(initiating) and why?
Please write a long explanation on rationing in health care. Please compare rationing in public and...
Please write a long explanation on rationing in health care. Please compare rationing in public and private health care system. Please provide your suggestions or solutions from an economist’s point of view.
For each of the following government programs, please identify and provide an explanation as to whether...
For each of the following government programs, please identify and provide an explanation as to whether they are efforts to correct market failure, to promote or discourage the consumption of merit or demerit goods, or to transfer income. a. Head Start, a preschool program for low-income children b. Sports leagues for children sponsored by local governments c. A program to limit air pollution generated by power plants d. Species preservation efforts by the government
For each of the following government programs, please identify and provide an explanation as to whether...
For each of the following government programs, please identify and provide an explanation as to whether they are efforts to correct market failure, to promote or discourage the consumption of merit or demerit goods, or to transfer income. a. Head Start, a preschool program for low-income children b. Sports leagues for children sponsored by local governments c. A program to limit air pollution generated by power plants d. Species preservation efforts by the government
Quick Solution Please..... OS (Operating Systems) [1] Briefly, what is the difference between: 1- Buffering &...
Quick Solution Please..... OS (Operating Systems) [1] Briefly, what is the difference between: 1- Buffering & Spooling. 2- Synchronous & Asynchronous I/O. 3- CPU-bound & I/O-bound jobs. 4- Multiprogramming & Timesharing. 5- Logical & Physical addresses. 6- User & Monitor modes in Operating System. [2] (i) Define Timesharing.      (ii) In a one processor system, there is an interrupt clock which is set to a “time slice Q”, that is, every Q an interrupt occurs to stop the process. There is...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT