SlideShare a Scribd company logo
NADAR SARASWATHI COLLEGE OF
ARTS AND SCIENCE
What is protection
The process in an operating system must be protected
from one another’s activities.
Protection refers to a mechanism for controlling the
access of programs, processes, or users to the resources
defined by a computer system.
What is security
Operating system security is the process of ensuring os
integrity, confidentiality and availability.
OS security refers to specified steps or measures used to
protect the OS from threats, viruses, worms, malware or
remote hacker intrusions.
Security Threats In OS
Unauthorized Access of the system by cracking the access
security methods and spoofing authentication for gaining
full access of the system.
Unauthorized use of resources use of resources by
installation of daemons running an unkown file server, or
logging every activity of target’s system like keystrokes.
Security threats
Malicious Modification of data which may have serious
indirect consequences.
Viruses are one of the greatest dangers for systems. If
they are once on the system, they can do a lot of damage
to the system.
OS Security Issuse
Among the issues to be considered these are the important
ones:
Physical Security
Authentication
Software vulnerabilities
Malwares
Precautions for OS Security
 To Secure Our system and to avoid the security breaches we
must take some precautions in our OS.
 So we have to ensure of the shown security components:
Bios Security
User Accounts Security
Data Security
Antivirus Security
Firewall
Most secure OS
 Now days Linux, Windows and other UNIX based
systems are the most secure operating systems.
 Because it has very less number of viruses and malwares
as compared to windows.
 Example:
 Ubuntu, Opernsuse, Fedora, RedHat etc.
Thank you

More Related Content

What's hot

Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Os security issues
Os security issuesOs security issues
Os security issues
JOLLUSUDARSHANREDDY
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Dheeraj Kataria
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects inVishnu Suresh
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
mastermind07
 
Security protection
Security protectionSecurity protection
Security protection
ARVINDR37
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2maranan_alexa
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!amoY91
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
Sunipa Bera
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer viruses
theonlineguru
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
Muhammad Abdurrabb
 
Computer virus
Computer virusComputer virus
Computer virus
SeethaDinesh
 
Session Fixation
Session FixationSession Fixation
Session FixationAung Khant
 
9080
90809080
CCNAS Ch01
CCNAS Ch01 CCNAS Ch01
CCNAS Ch01
rami alamoudi
 

What's hot (19)

Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Os security issues
Os security issuesOs security issues
Os security issues
 
Lab 2
Lab 2Lab 2
Lab 2
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects in
 
Chap 2 lab 2
Chap 2 lab 2Chap 2 lab 2
Chap 2 lab 2
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Security protection
Security protectionSecurity protection
Security protection
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
 
Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Operating System & Application Security
Operating System & Application SecurityOperating System & Application Security
Operating System & Application Security
 
Different types of computer viruses
Different types of computer virusesDifferent types of computer viruses
Different types of computer viruses
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Session Fixation
Session FixationSession Fixation
Session Fixation
 
9080
90809080
9080
 
Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
CCNAS Ch01
CCNAS Ch01 CCNAS Ch01
CCNAS Ch01
 

Similar to operating system

ossecurity-161dfghjkjn201150103 (1).pptx
ossecurity-161dfghjkjn201150103 (1).pptxossecurity-161dfghjkjn201150103 (1).pptx
ossecurity-161dfghjkjn201150103 (1).pptx
bestmorfingamer
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
abdullah roomi
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Insecurity vssut
Insecurity vssutInsecurity vssut
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
faraz hussain
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
xsy
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
Sitamarhi Institute of Technology
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasiPertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasi
newbie2019
 
Cyber security
Cyber securityCyber security
Cyber security
Eduonix
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
SonuRoy30
 
cybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdfcybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdf
Priyank40
 
Security testing vikesh kumar
Security testing vikesh kumarSecurity testing vikesh kumar
Security testing vikesh kumar
Vikesh Kumar
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
IGZ Software house
 

Similar to operating system (20)

ossecurity-161dfghjkjn201150103 (1).pptx
ossecurity-161dfghjkjn201150103 (1).pptxossecurity-161dfghjkjn201150103 (1).pptx
ossecurity-161dfghjkjn201150103 (1).pptx
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Protection and security
Protection and securityProtection and security
Protection and security
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasiPertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasi
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
cybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdfcybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdf
 
Security testing vikesh kumar
Security testing vikesh kumarSecurity testing vikesh kumar
Security testing vikesh kumar
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 

More from renukarenuka9

mobile computing
mobile computingmobile computing
mobile computing
renukarenuka9
 
Dip
DipDip
Compiler design
Compiler designCompiler design
Compiler design
renukarenuka9
 
Web programming
Web programmingWeb programming
Web programming
renukarenuka9
 
Software engineering
Software engineeringSoftware engineering
Software engineering
renukarenuka9
 
Software engineering
Software engineeringSoftware engineering
Software engineering
renukarenuka9
 
Software engineering
Software engineeringSoftware engineering
Software engineering
renukarenuka9
 
Bigdata
BigdataBigdata
Bigdata
renukarenuka9
 
Bigdata ppt
Bigdata pptBigdata ppt
Bigdata ppt
renukarenuka9
 
Rdbms
RdbmsRdbms
Rdbms
RdbmsRdbms
Rdbms
RdbmsRdbms
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
renukarenuka9
 
Computer network
Computer networkComputer network
Computer network
renukarenuka9
 
computer network
computer networkcomputer network
computer network
renukarenuka9
 
operating system
operating systemoperating system
operating system
renukarenuka9
 
data mining
data miningdata mining
data mining
renukarenuka9
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
renukarenuka9
 
data mining
data miningdata mining
data mining
renukarenuka9
 

More from renukarenuka9 (20)

mobile computing
mobile computingmobile computing
mobile computing
 
Dip
DipDip
Dip
 
Compiler design
Compiler designCompiler design
Compiler design
 
Web programming
Web programmingWeb programming
Web programming
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Bigdata
BigdataBigdata
Bigdata
 
Bigdata ppt
Bigdata pptBigdata ppt
Bigdata ppt
 
Rdbms
RdbmsRdbms
Rdbms
 
Rdbms
RdbmsRdbms
Rdbms
 
Rdbms
RdbmsRdbms
Rdbms
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Data mining
Data miningData mining
Data mining
 
Computer network
Computer networkComputer network
Computer network
 
computer network
computer networkcomputer network
computer network
 
operating system
operating systemoperating system
operating system
 
data mining
data miningdata mining
data mining
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
data mining
data miningdata mining
data mining
 

Recently uploaded

Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
NathanBaughman3
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
yusufzako14
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
muralinath2
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
DiyaBiswas10
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
muralinath2
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 
insect taxonomy importance systematics and classification
insect taxonomy importance systematics and classificationinsect taxonomy importance systematics and classification
insect taxonomy importance systematics and classification
anitaento25
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 
Citrus Greening Disease and its Management
Citrus Greening Disease and its ManagementCitrus Greening Disease and its Management
Citrus Greening Disease and its Management
subedisuryaofficial
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Ana Luísa Pinho
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
muralinath2
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
SAMIR PANDA
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Sérgio Sacani
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SELF-EXPLANATORY
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
Health Advances
 

Recently uploaded (20)

Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
insect taxonomy importance systematics and classification
insect taxonomy importance systematics and classificationinsect taxonomy importance systematics and classification
insect taxonomy importance systematics and classification
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 
Citrus Greening Disease and its Management
Citrus Greening Disease and its ManagementCitrus Greening Disease and its Management
Citrus Greening Disease and its Management
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
 

operating system

  • 1. NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE
  • 2. What is protection The process in an operating system must be protected from one another’s activities. Protection refers to a mechanism for controlling the access of programs, processes, or users to the resources defined by a computer system.
  • 3. What is security Operating system security is the process of ensuring os integrity, confidentiality and availability. OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions.
  • 4. Security Threats In OS Unauthorized Access of the system by cracking the access security methods and spoofing authentication for gaining full access of the system. Unauthorized use of resources use of resources by installation of daemons running an unkown file server, or logging every activity of target’s system like keystrokes.
  • 5. Security threats Malicious Modification of data which may have serious indirect consequences. Viruses are one of the greatest dangers for systems. If they are once on the system, they can do a lot of damage to the system.
  • 6. OS Security Issuse Among the issues to be considered these are the important ones: Physical Security Authentication Software vulnerabilities Malwares
  • 7. Precautions for OS Security  To Secure Our system and to avoid the security breaches we must take some precautions in our OS.  So we have to ensure of the shown security components: Bios Security User Accounts Security Data Security Antivirus Security Firewall
  • 8. Most secure OS  Now days Linux, Windows and other UNIX based systems are the most secure operating systems.  Because it has very less number of viruses and malwares as compared to windows.  Example:  Ubuntu, Opernsuse, Fedora, RedHat etc.