Question

In: Computer Science

What are system access threats? and some examples.

What are system access threats? and some examples.

Solutions

Expert Solution

The most common threat in a networked system is unauthorized access to information and computer resources. System threats refer to misuse of system services and network connections to put user in trouble.  System threats create such an environment that operating system resources or user files are misused. Threats may cause the loss of confidentiality, integrity, and availability of the information technology assets.

The computer system must be protected against threats by:

1. Authorized user - If a computer program is run by an unauthorized user, then they may cause severe damage to computers or data stored in it.

2. Authentication - It refers to identifying each user of the system and associating the executing programs with those users. It is the responsibility of the Operating System to create a protection system which ensures that a user who is running a particular program is authentic. Operating Systems generally identifies/authenticates users using following ways −

a.Username / Password − User need to enter a registered username and password with Operating system to login into the system.

b. User card/key − User need to punch card in card slot, or enter key generated by key generator in option provided by the operating system to login into the system.

c. User attributes like fingerprint/ eye retina pattern/ signature − User need to pass his/her attribute via a designated input device used by operating system to login into the system.

3. One Time password -   One-Time passwords provide additional security along with normal authentication. In the One-Time Password system, a unique password is required every time user tries to login into the system. Once a one-Time password is used, then it cannot be used again.

Operating system's processes and kernel do the designated task as instructed. If a user program made these process do malicious tasks, then it is known as Program Threats. One of the common examples of program threat is a program installed in a computer which can store and send user credentials via network to some hacker.

System threats refer to misuse of system services and network connections to put user in trouble. System threats can be used to launch program threats on a complete network called as program attack. System threats create such an environment that operating system resources/ user files are misused.

Following are the list of some well-known system threats :[ Examples]

· Worm − Worm is a process which can choke down system performance by using system resources to extreme levels. A Worm process generates its multiple copies where each copy uses system resources, prevents all other processes to get required resources. Worm processes can even shut down an entire network.

· Port Scanning − Port scanning is a mechanism or means by which a hacker can detects system vulnerabilities to make an attack on the system.

· Denial of Service − Denial of service attacks normally prevents user to make legitimate use of the system. For example, a user may not be able to use internet if denial of service attacks browser's content settings.

· Computer virus: Carefully evaluating free software downloads from peer-to-peer file sharing sites, and emails from unknown senders are crucial to avoiding viruses. Most web browsers today have security settings which can be ramped up for optimum defense against online threats. The most-effective way of fending off viruses is up-to-date antivirus software from a reputable provider.

· Remote Desktop accounts: Someone working from home probably has access to a critical computer or server. It's a good disaster recovery plan move. Attackers too often phish those credentials or even brute force them.


Related Solutions

What are device control threats? and a few examples.
What are device control threats? and a few examples.
How does emergency management learn from history? Give some examples. What are the threats you believe...
How does emergency management learn from history? Give some examples. What are the threats you believe are most likely to create an incident in your community?
What is the "false self system"? What are some examples of the false self? Why is...
What is the "false self system"? What are some examples of the false self? Why is it apart of our personalities?
What are some examples of Lean or the Toyota Production System in the book "The Missing...
What are some examples of Lean or the Toyota Production System in the book "The Missing Links" by Caroline Mondon?
What are some Motivations and techniques used for Advanced Persistent Threats (APT)? What are some events...
What are some Motivations and techniques used for Advanced Persistent Threats (APT)? What are some events that may indicate an active attack in terms of APTs? What are some Attack Surfaces and Vectors for Advanced Persistent Threats (APT)?
What are some of the external “opportunities” and “threats” to organizations that can be associated with...
What are some of the external “opportunities” and “threats” to organizations that can be associated with the COVID-19? (state at least three (3) each
What is a refractory metal? What are some examples? What is a precious metal? What are some examples?
What is a refractory metal? What are some examples? What is a precious metal? What are some examples?
What are some examples of manufacturing that conform to the product life-cycle? What are some examples...
What are some examples of manufacturing that conform to the product life-cycle? What are some examples that don't?
Think about an Information Technology organization and the costing system utilized. What are some examples of...
Think about an Information Technology organization and the costing system utilized. What are some examples of cost drivers? How do these cost drivers assist in allocating costs?
Think about an IT(Software) company and the costing system utilized. What are some examples of cost...
Think about an IT(Software) company and the costing system utilized. What are some examples of cost drivers? How do these cost drivers assist in allocating costs?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT