Security Evaluation of Google Chrome Operating System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Due to the increase nature of computer threats and attacks, the security of the operating system isparamount in the computing world today. Every modern computer system, from network servers, workstationdesktops, to laptops and hand-held devices, has a core piece of software, called operating system (OS) executedon the top of a bare machine of hardware that allocates the basic resources of the system and supervises theexecution of all applications within the system. This paper investigates and evaluates the security of GoogleChrome Operating System. Google Chrome Operating system is an operating system developed by google,which runs on specialized hardware. The Chrome OS differ from traditional operating system such as Windowsin that it is designed to work specifically with web pplications. In this operating system, the user data livesessentially on the web. Thus, if the physical machine-laptop is lost or stolen, the user can still access their dataonline. However, the Chromebook also allows users to access downloaded data offline, which must be kept safe.To achieve this, Chrome OS ensures that all downloaded data is protected and that code running on thisChromebook is safe to use. In order to avoid security challenges of traditional operating system such as virusand worms, ChromeBook not only ensures that the code is safe, but also incorporates an autoupdate features toadd new patches to the system.
Authors and Affiliations
Ogbuabor Godwin Okechukwu
PAPR Reduction in OFDM Model
Abstract: Multipath reflects the signal with different phases. The best solution of multipath fading is OFDM.Orthogonal frequency division multiplexing (OFDM) has been focused on in high data rate wireless communic...
Classification of Cardiovascular Disease from ECG using Artificial Neural Network and Hidden Markov Model.
Abstract: this paper deals with the classification of cardiovascular disease for its future analysis. If future progression of the disease can be predicted earlier with proper change in medication patients treatmen...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Sensor Network
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.  ...
Review and Performance Comparison of Distributed Wireless Reprogramming Protocols: SDRP and ISDRP
A Reprogramming service should be efficient, reliable and secured in Wireless sensor network. Wireless reprogramming for wireless sensor network emphasize over the process of changing or improving the funct...
lntrusion Detection System Using GA
Abstract: Intrusion detection has become an essential component of computer security in recent years so many technologies have been developed to protect our system or network from intruders such as antivirus, firew...