Sunday 16 June 2013

Study Of Operating System Security

Flaws in the operating systems of computers are discovered almost daily. The majority of viruses take advantage of these flaws to infect your computer. Once a virus enters your system, it can potentially cause devastating damage. To avoid contracting a virus, you should take the following basic precautions:

Software Updates - Make sure that the software on your computer is regularly updated. By doing so, most viruses can be avoided. We recommend setting your computer to check for software updates automatically.
Firewall - Run a firewall program on your computer. A firewall is a device or program that blocks undesired Internet traffic, including viruses, from accessing your computer. Both Windows and Mac OS X have built-in firewall programs that are easy to set up. By blocking unwanted Internet traffic, a lot of viruses and bugs can be stopped dead in their tracks!
Account Management - Manage the user accounts on your computer, so you can control exactly who can log into your machine. Especially on Windows XP machines, it is easy to accidentally leave your computer wide open to unauthorized users.
Antivirus Software - Use your antivirus software to scan for viruses as files are being launched.
Overview of Operating System Security
  • It is unnecessary to say that all operating systems are not equal in every sphere.
  • None of the most accepted operating systems now a day are developed keeping safe and sound electronic business in mind.
  • From the moment the computer is booted (after loading the BIOS), the interaction with the operating system starts.
  • This essential portion of software describes what can be done with the system of the computer and how it is to be done.
  • Whether the interaction is with the file system or while chatting with somebody with the help of an instant messenger line up, the operating system works at the back the pictures to provide with a perfect experience as it understands the procedures and changes them into those things that the computer can process.
  • Even as operating systems differ on a lot of levels, the most ordinary operating systems offer much more than an easy crossing point between the user and the machine.
  • These include many programs with the intention to provide the user with many extras, starting from the straightforward screen savers to multifaceted file-encryption plans. However, it's vital to know that these programs are add-ons which are added on to the OS and are not essential for the computer to function.
  • A lot of users become closely familiar with the operating system's frills (such as the Solitaire), but do not remember about the security parameters that are incorporated to help the user preserve a secure and dependable operating setting.
  • And therefore, a lot of information systems continue living in an insecure condition that keeps the system at the danger of a virus infection or at the total compromise by a hacker.
  • From creation a protected home network to creating well-built passwords, it is very vital to know the particulars of using an operating system in a secure and safe and sound mode.
  • In today's world, where the computer is an essential gadget it is foolish to set up a computer devoid of the security system.
  • It is only one virus or Trojan horse that is enough to form a concurrent consequence of contaminated computers and compromise systems.
  • UNIX which is the eldest and the majorly used networking operating system of today’s world has got the benefit of having been patched and hacked by crackers and hackers for many years.
  • Amongst all other UNIX derivatives, the most popular derivatives is Linux, which was developed by Linus Torvalds and now being maintained by a lot many of volunteers and a lot of software companies.
  • But this Linux still has got errors which are being discovered in a day to day basis.
  • It is tremendously significant to keep an eye on these incidences and use the essential patches of the updates as soon as they are accessible.
  • Microsoft's Windows family platform has got an extraordinary expansion as a server and client platform.
  • Whether it is installed in the thousands of home PCs, in the Internet server or on corporate LANs, its fame has made it more prone for breakage by many hackers.
  • Bodily security is becoming more and more common through out the world as novel and graver terrorizations are emerging.
  • Physical security of public and possessions comes in course of time to most human; still then the lost in the mix up is the prime necessitate for securing the data.
  • Over and over again this data contains responsive information that is sought after by people against the law.
Encryption and Privacy resource
  • It acts as a source for learning about a range of encryption schemes.
  • This includes privacy fortification tips and security fundamentals.
NIST Vulnerability and Threat Portal
  • It is an absolute portal for recent attacks or incidents, bugs, advisories, etc kept up by the National Institute of Standards and Technology.
PC Talk - Security
  • This is the latest news from the field of IT security.
CERT/CCC Current Activity
  • Central depository for high force security vulnerabilities and incidents are being informed to the CERT or CCC.
The two best security oriented operating systems are:
Back Track:
  • This is an Innovative Penetration Testing which comes live from Linux distribution.
  • This brilliant bootable live-CD has generated as a result of from the merger of Whax and Auditor.
  • It shows off an enormous diversity of Security and Forensics apparatus and provides an affluent maturity of the environment.
  • The user modularity is highlighted so the allocation can be customized with no trouble by the user to incorporate private scripts, extra tools, customized kernels, etc.
Knoppix:
  • This is designed as the general purpose live bootable system to be taken on CD or DVD. It consists of a diplomatic set of involuntary hardware revealing, GNU/Linux software, and hold up for a lot of sound cards, graphics cards, USB and SCSI appliances and other peripherals.
  • KNOPPIX can also be used as a creative Linux system as the educational CD, desktop, rescue system.

Turning on the Firewall

A firewall is used to prevent unwanted intruders accessing your computer. For example, when a program on your system tries to access an outside network, it first needs permission from your firewall.
To turn on the Windows XP Firewall, follow these steps:
  1. Go to the Start menu.
  2. Click Control Panel.
  3. Click Windows Firewall. A dialog box similar to the one shown below will open.
  1. Select On.
  2. Click OK.
This section covers the basic steps you need to take to keep your Windows XP computer secure and free of viruses: setting your computer to check for virus updates automatically, turning on your firewall, managing the accounts on your computer, and creating secure passwords.

Automatic Update - Windows XP

One of the best ways to keep your computer secure is to regularly update your software. You can set your computer to check for updates automatically. When you first install Windows XP, you will be asked whether you want to check for and install updates regularly. If Windows does not do this, or if you are unsure whether you have automatic updates activated, follow these steps:
  1. Go to the Start menu.
  2. Click Control Panel.
  3. Click Automatic Updates. A dialog box similar to the one shown below will open.
  1. Select the Automatic option. This will configure your computer to check for updates automatically.
  2. You can also choose how often and when you want Windows to check for updates, using the drop-down menus under the Automatic option. We recommend that you set your computer to check for updates once a week. You should enter a date and time when your computer will be turned on and connected to the Internet. You might also consider setting a time when you would not be sitting at your computer as the updating process can slow down the overall performance of your computer. If you miss the automatic update cycle because your computer was not turned on, don't worry, your computer will grab updates the next time it has access to the Internet.

Turning on the Firewall

A firewall is used to prevent unwanted intruders accessing your computer. For example, when a program on your system tries to access an outside network, it first needs permission from your firewall.
To turn on the Windows XP Firewall, follow these steps:
  1. Go to the Start menu.
  2. Click Control Panel.
  3. Click Windows Firewall. A dialog box similar to the one shown below will open.
  4. Select On.
  5. Click OK.

Account Management

To control who can access your computer, you should have at least a basic knowledge of account management. If you are a Windows XP user, you are probably using an account that you generated when you first set up your computer. Windows XP usually generates a number of other accounts automatically that you might not even realize are there, including an Administrator account with NO PASSWORD! Many viruses target these unprotected pathways into your computer.
To edit the user accounts on your computer, follow these steps:
  1. Go to the Start menu.
  2. Click Control Panel.
  3. Double-click User Accounts. The User Accounts window will open, similar to the one shown below, showing the user accounts on your computer.
  1. To edit the user accounts on your computer, select an account by clicking it. A window will open, showing a list of editing options. From here, you can change the username, password, or picture of an account, or delete an account.

Account Password Management

We recommend that you make sure that all user accounts on your computer have a good password. For Windows XP systems, it is especially important to give every administrator account a secure password, as these accounts have the most freedom. Manage your passwords carefully. You should think of your account password as the equivalent of locking your house or car. Here are some tips for password management:
  • Random - When deciding on your password, avoid the more obvious choices, such as the name of your pet or your birthday. A good password is one that is more random in nature. Include both letters and numbers, and use a combination of both lower case and upper case letters.
  • Variation - If you have multiple user accounts, we recommend that you use a different password for each account.
  • Hard Copy - Many security experts warn against writing down a password, in case it falls into the wrong hands. However, we recommend that you maintain a hard-copy of your passwords in a safe location, somewhere that only you have access to, for example a locked file cabinet or safe. We feel that this is a safer option than using only a limited number of passwords.
To change a password on a user account, follow these steps:
  1. Go to the Start menu.
  2. Click Control Panel.
  3. Click User Accounts. The User Accounts window will open, showing the user accounts on your computer.
  4. Click Change an Account.
  5. Click the account whose password you want to change.
  6. Click Create a Password.
  7. Enter your new password, and then enter a password hint.
  8. Click Create Password.


EmoticonEmoticon