Securing Operating System

Abstract

One of the fundamental concerns in the security of cyberspace and e-commerce is the security of operating systems that are the core piece of software running in all information systems, such as network devices (routers, firewalls, etc), Web servers, customer desktops, PDAs, and so on. Many of known vulnerabilities discovered so far are rooted from the bugs or deficiency of underneath operating systems. This paper discusses the security (or lack of security) of most commercial operating systems like Unix and Microsoft Windows, and its effect to the overall security of Web based applications and services. Based on DOD’s trusted computer system model, the current effort toward development of secure operating systems is presented, and as a case study, the publicly available security enhanced Linux, SE-Linux, is also analysed.

Authors and Affiliations

Sahil Jindal, Praveen Rohilla, Puneet Gulati

Keywords

Related Articles

Inventory Reduction Using Analytic Hierarchy Process in an Automotive Industry

The main objective of this paper is to present about a model which was developed for finding the total inventory cost for a leading two wheeler manufacturer in south India. The model was developed using basic Economic O...

slugBat Algorithm for Resource Scheduling In Cloud Computing

Scheduling of resources is a complicated process in cloud computing because of the heterogeneous nature of the cloud and multiple copies of same task is given to multiple computers. Therfore in this pap...

Efficient Clustering Technique for Information Retrieval in Data Mining

In the emerging new wave of applications where people are the ultimate target of text clustering methods, cluster labels are intended to be read and comprehended by humans. The primary objective of a clustering method s...

Repurchase Model for Telecom Customers

Intensified competition and frequent shifting of customer base for fixed- line telecom service providers, in the recent years, has increased the necessity for better targeting and segmenting prospects and customers, for...

A Review on Enhancing the Performance of MPPT for Single Stage PV-Grid Connected System Using Particle Swarm Optimization Technique

The scaling of maximum power point tracking (MPPT) system is suggested. The optimal operating point of a solar module is known as the maximum power point (MPP) and it changes with its own characteristic as well as cell...

Download PDF file
  • EP ID EP19004
  • DOI -
  • Views 221
  • Downloads 9

How To Cite

Sahil Jindal, Praveen Rohilla, Puneet Gulati (2014). Securing Operating System. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(10), -. https://europub.co.uk/articles/-A-19004