SlideShare a Scribd company logo
B.Sc (Computer Science)
S.C.S.(A) College, Puri
Introduction
OS Security Issues
Security Threats In OS
Precautions For OS Security
The Most Secure OS
Conclusion
Reference
Contents
What is Operating System(OS) ?
An operating system is a set of programs designed to
run other programs on a computer.
OS Security generally refers to the protection of
Information stored, as well as the Data we deal with
in realtime, while using a Computer System.
Introduction
Security of an OS depends upon
how the system is being used by
the administrator and how well it
is maintained.
Among the
issues to be
considered
these are the
important
ones:-
Physical Security
Authentication
Software
Vulnerabilities
Malwares
OS Security
Issues
Some of the Main Security Threats of OS are :-
Security Threats In OS
Unauthorized Access of the system by cracking the Access
Security Methods and spoofing Authentication for gaining full
access of the system.
Unauthorized use of resources by installation of daemons
running an unknown file server, or logging every activity of
target’s System like keystrokes , screenshots etc.
Theft of confidential information, such as credit-card numbers,
Account Passwords, programming source codes, secret
formulas, medical information, financial information, etc.
Security Threats continue…
Some of the Main Security Threats of OS are :-
Malicious Modification of data, which may have serious indirect
consequences. For example:- A popular game or other program's
source code could be modified before being released to the
public to open up security holes on systems.
Denial of Service, DOS - Preventing authenticated users from
using the system, often by overloading the system with an excess
of requests for service and to forcefully shut down the system.
Viruses are one of the greatest dangers for systems. If they are
once on the system , they can do a lot of damage to the system.
Precautions for OS Security
To Secure Our System and to
avoid the Security breaches
we must take some
precautions in our OS.
So we have to ensure of the
Shown Security
Components:-
Bios Security
User Accounts Security
Data Security
Antivirus Security
Firewall
Precautions continue…
Bios Security
 Bios is the boot menu where the machine selects a
OS to boot.
 We should Set up a Bios Settings Security password
to ensure that nobody can change your Bios settings
to load any other OS by which any one cant be able
to hack your user accounts Passwords.
 Be careful when setting it up if you forgot the
password you may not be able to Boot. So only set
Password for Bios settings not for Boot.
Mostly all of us login to our systems by using
passwords but it is less secure because we always set
a simple password which can be easily guessed.
User Accounts Security
So we need to set a complex password using
alphanumeric characters, symbols, Upper Case and
lower case letters.
Your Password must be strong enough that can’t be
guessed or cracked by various Brute force or
Dictionary Attacks.
Precautions continue…
Data security is Quite important because our private
and confidential data needs better Protection to avoid
the danger of data stealth.
Data Security
Precautions continue…
It Can Only be done if we lock and Encrypt Our
Sensitive Data with a strong password and a highly
secure Encryption(128 bit/256 bit) method.
 Bit Locker Comes With Windows Default. Various
Data Security Softwares Available on the internet.
E.g.:-Folder Lock, Folder Protect , Data Locker etc.
Antivirus has the vital role in OS Security and its not
preloaded in any system although there is windows
defender in every windows os which provides a basic
protection fom wellknown threats.
Antivirus Security
Precautions continue…
We Need a good Antivirus Program {Having a good
Threat Sense Technology} to secure our systems from
viruses like; Trojans, Worms, Spywares, Key loggers,
Link Exploits….etc.
E.g.:-Eset, Quick Heal, Norton etc.
Firewall
Firewall is a Security wall between the Network and
the OS.Every connection to outside or inside the OS
both requires permission from Firewall.
Precautions continue…
As Windows OS got Firewall but it is not interactive,
for which unwanted programs gets internet access
and transmit data from the System.
So we must install a Personal Firewall to manually
Block those unwanted programs to access internet
and to restrict them from sending and receiving Data
over the Network.
E.g.:-Netpeeker Personal Firewall
Windows is the most used OS among computers that’s
why it becomes priority of attacker’s to attack windows
users and it’s made quite easy for them by the availability
of more no. of viruses and malwares for windows
platform .
The Most Secure OS
Nowadays Linux and other UNIX-based
Systems are the most secure operating
systems.
Because it has very less number of
viruses and malwares as compared to
windows.
E.g.:-Ubuntu, OpenSuse ,Fedora, RedHat etc.
Linux OS
Conclusion
The security of Operating System
depends on us because the more
precautions we will take the more
secure our Operating System will be.
Note:-
# Always make sure that your antivirus is up-to-date and it provides genuine protection from all the latest threats.
# ‘Laptop Users’ if you are not using your webcam then disable it from the device manager its quite obvious that
someone watching you from your webcam.
References
Any
Questions
Thank
You
12:10

More Related Content

What's hot

INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
Meghaj Mallick
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
A. Shamel
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
System security
System securitySystem security
System security
sommerville-videos
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
Aasim Mushtaq
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
daniyalqureshi712
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Cia security model
Cia security modelCia security model
Cia security model
Imran Ahmed
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
What is malware
What is malwareWhat is malware
What is malware
Malcolm York
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
NishaYadav177
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian
 

What's hot (20)

INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
System security
System securitySystem security
System security
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Cia security model
Cia security modelCia security model
Cia security model
 
Computer security
Computer securityComputer security
Computer security
 
What is malware
What is malwareWhat is malware
What is malware
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 

Similar to Operating System Security

operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
qacaybagirovv
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
Wikki Verma
 
operating system
operating systemoperating system
operating system
renukarenuka9
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
renukarenuka9
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
Steven Cahill
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
xsy
 
Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...
Andrew Clark
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
SdhrYdv1
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
AashishTanania
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Data security
Data securityData security
Data security
Soumen Mondal
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
Bipulok
 
WK8.pptx
WK8.pptxWK8.pptx
Security protection
Security protectionSecurity protection
Security protection
ARVINDR37
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Symantec Antivirus Management.pptx
Symantec Antivirus Management.pptxSymantec Antivirus Management.pptx
Symantec Antivirus Management.pptx
bemnitekalegn
 

Similar to Operating System Security (20)

operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
 
operating system
operating systemoperating system
operating system
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
system Security
system Security system Security
system Security
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Data security
Data securityData security
Data security
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Security protection
Security protectionSecurity protection
Security protection
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Symantec Antivirus Management.pptx
Symantec Antivirus Management.pptxSymantec Antivirus Management.pptx
Symantec Antivirus Management.pptx
 

Recently uploaded

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 

Recently uploaded (20)

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 

Operating System Security

  • 2. Introduction OS Security Issues Security Threats In OS Precautions For OS Security The Most Secure OS Conclusion Reference Contents
  • 3. What is Operating System(OS) ? An operating system is a set of programs designed to run other programs on a computer. OS Security generally refers to the protection of Information stored, as well as the Data we deal with in realtime, while using a Computer System. Introduction Security of an OS depends upon how the system is being used by the administrator and how well it is maintained.
  • 4. Among the issues to be considered these are the important ones:- Physical Security Authentication Software Vulnerabilities Malwares OS Security Issues
  • 5. Some of the Main Security Threats of OS are :- Security Threats In OS Unauthorized Access of the system by cracking the Access Security Methods and spoofing Authentication for gaining full access of the system. Unauthorized use of resources by installation of daemons running an unknown file server, or logging every activity of target’s System like keystrokes , screenshots etc. Theft of confidential information, such as credit-card numbers, Account Passwords, programming source codes, secret formulas, medical information, financial information, etc.
  • 6. Security Threats continue… Some of the Main Security Threats of OS are :- Malicious Modification of data, which may have serious indirect consequences. For example:- A popular game or other program's source code could be modified before being released to the public to open up security holes on systems. Denial of Service, DOS - Preventing authenticated users from using the system, often by overloading the system with an excess of requests for service and to forcefully shut down the system. Viruses are one of the greatest dangers for systems. If they are once on the system , they can do a lot of damage to the system.
  • 7. Precautions for OS Security To Secure Our System and to avoid the Security breaches we must take some precautions in our OS. So we have to ensure of the Shown Security Components:- Bios Security User Accounts Security Data Security Antivirus Security Firewall
  • 8. Precautions continue… Bios Security  Bios is the boot menu where the machine selects a OS to boot.  We should Set up a Bios Settings Security password to ensure that nobody can change your Bios settings to load any other OS by which any one cant be able to hack your user accounts Passwords.  Be careful when setting it up if you forgot the password you may not be able to Boot. So only set Password for Bios settings not for Boot.
  • 9. Mostly all of us login to our systems by using passwords but it is less secure because we always set a simple password which can be easily guessed. User Accounts Security So we need to set a complex password using alphanumeric characters, symbols, Upper Case and lower case letters. Your Password must be strong enough that can’t be guessed or cracked by various Brute force or Dictionary Attacks. Precautions continue…
  • 10. Data security is Quite important because our private and confidential data needs better Protection to avoid the danger of data stealth. Data Security Precautions continue… It Can Only be done if we lock and Encrypt Our Sensitive Data with a strong password and a highly secure Encryption(128 bit/256 bit) method.  Bit Locker Comes With Windows Default. Various Data Security Softwares Available on the internet. E.g.:-Folder Lock, Folder Protect , Data Locker etc.
  • 11. Antivirus has the vital role in OS Security and its not preloaded in any system although there is windows defender in every windows os which provides a basic protection fom wellknown threats. Antivirus Security Precautions continue… We Need a good Antivirus Program {Having a good Threat Sense Technology} to secure our systems from viruses like; Trojans, Worms, Spywares, Key loggers, Link Exploits….etc. E.g.:-Eset, Quick Heal, Norton etc.
  • 12. Firewall Firewall is a Security wall between the Network and the OS.Every connection to outside or inside the OS both requires permission from Firewall. Precautions continue… As Windows OS got Firewall but it is not interactive, for which unwanted programs gets internet access and transmit data from the System. So we must install a Personal Firewall to manually Block those unwanted programs to access internet and to restrict them from sending and receiving Data over the Network. E.g.:-Netpeeker Personal Firewall
  • 13. Windows is the most used OS among computers that’s why it becomes priority of attacker’s to attack windows users and it’s made quite easy for them by the availability of more no. of viruses and malwares for windows platform . The Most Secure OS Nowadays Linux and other UNIX-based Systems are the most secure operating systems. Because it has very less number of viruses and malwares as compared to windows. E.g.:-Ubuntu, OpenSuse ,Fedora, RedHat etc. Linux OS
  • 14. Conclusion The security of Operating System depends on us because the more precautions we will take the more secure our Operating System will be. Note:- # Always make sure that your antivirus is up-to-date and it provides genuine protection from all the latest threats. # ‘Laptop Users’ if you are not using your webcam then disable it from the device manager its quite obvious that someone watching you from your webcam.