Securing Operating System

Abstract

One of the fundamental concerns in the security of cyberspace and e-commerce is the security of operating systems that are the core piece of software running in all information systems, such as network devices (routers, firewalls, etc), Web servers, customer desktops, PDAs, and so on. Many of known vulnerabilities discovered so far are rooted from the bugs or deficiency of underneath operating systems. This paper discusses the security (or lack of security) of most commercial operating systems like Unix and Microsoft Windows, and its effect to the overall security of Web based applications and services. Based on DOD’s trusted computer system model, the current effort toward development of secure operating systems is presented, and as a case study, the publicly available security enhanced Linux, SE-Linux, is also analysed.

Authors and Affiliations

Sahil Jindal, Praveen Rohilla, Puneet Gulati

Keywords

Related Articles

Drug-Drug Interaction Studies of Ibutilide Fumarate with Verapamil and Stability Indicating Method by Chromatographic Techniques

the aim of the present work is to study interactions of ibutilide fumarate with the antihypertensive drug verapamil at physiological ph 7.4 and temperature 37oc under simulated condition and using commercially procured...

To Study the Variation in Compressive and Split Tensile Strength of Concrete by Using Various Binders

This paper accentuates the effect of bentonite, sugarcane molasses, jaggery and polyvinyl acetate on strength properties of concrete. The experimentation has been carried out to assess the strength properties of concret...

Analysis of Multipurpose Buildings with Infill Walls

It is common practice by structural engineer to consider the infill panels as non-structural member and their stiffness contribution in structure is neglected. A multipurpose building is one which can be used for more t...

slugPower Efficient Location Based Routing

In wireless ad - hoc networks, there are several characteristics different among wired networks. The differences are varying of network topology, limited resources like bandw idth and energy...

Implementation of Enhancement of Apriori Algorithm

As with the advancement of the IT technologies, the amount of accumulated data is also increasing. It has resulted in large amount of data stored in databases, warehouses and other repositories. Thus the Data mining com...

Download PDF file
  • EP ID EP19004
  • DOI -
  • Views 273
  • Downloads 9

How To Cite

Sahil Jindal, Praveen Rohilla, Puneet Gulati (2014). Securing Operating System. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(10), -. https://europub.co.uk/articles/-A-19004