Protection And Security Of An Operating System

Abstract

In this research paper first of all we gave a brief introduction of the operating system, furthers its types is also explained with an example and its component also. In this paper we show that what kind of problem arise, when we protect our operating system, how we can overcome from these problem. In this paper, we show what new requirements arise when introducing security and protection to the operating system into the area of real time operating system as well as distributed and many more operating system.

Authors and Affiliations

Jyoti Yadav, Kriti Bhatia, Kriti Kaushik

Keywords

Related Articles

Use of Electrical and Electronic Sensors in the Chemical Industry

Chemical industries, particularly those operated in continuous or steady state mode, rely on sensors for continuous feedback regarding key process parameters and product specifications. For example, most Chemical Indust...

slugMitigation of flooding Attack in MANET using NS-3

Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e. mobile phone, laptop, per...

Seismic Analysis of a Multistorey RC Building for Various Lateral Load Resisting Systems by Response Spectrum Method

The current work deals with analysis of Multi-storey RC building for earthquake effects that develops lateral loads on buildings by Response spectrum method. In this method, peak acceleration for an earthquake is acted...

An Experimental Study on Rubberized Concrete by Using Waste Material with the Addition of Human Hair as Fiber

Rubberized concrete is a concrete in which the scrap tire rubber is used as a partial replacement of coarse aggregate. It has been estimated that nearly 1000 million tires reach the end of their useful lives every year...

“Marker-Controlled Watershed Transform in Digital Mammogram Segmentation”

Breast cancer is one of the major causes of death among women thus; to detect the breast cancer in digital mammogram, firstly we have to segment it properly. Segmentation refers to the process of partitioning a digital...

Download PDF file
  • EP ID EP18935
  • DOI -
  • Views 258
  • Downloads 10

How To Cite

Jyoti Yadav, Kriti Bhatia, Kriti Kaushik (2014). Protection And Security Of An Operating System. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(10), -. https://europub.co.uk/articles/-A-18935