os202

OS202

View on GitHub

HOME


Top 10 List of Week 02

  1. Malware
    Malware is software designed to manipulate and damage computer systems. It does so by accessing the rights of the executing user of the computer systems. Malwares can be injected through various things like files, softwares or websites.

  2. Denial of Service Attack
    Denial of Service or DoS attack is an attack aimed on distrupting legitimate use of a system of facility. Keep in mind tha its main intention is not to exploit or steal your resources.

  3. Viruses
    Viruses is a nother form of program which manifests itself as fragment of code of a legitimate program. Like a real virus, virus on a computer has the ability to replicate and infect other programs on your computer.

  4. Port Scanning
    Port scanner is a way for a hacker to identify the weak points or vulnerabilities inside a system to maybe commit an attack.

  5. Encryption
    Encryption is a tool used to send messages securely across a network, as well as protect database data, files and disks from having their contents read by unauthorized entities.

  6. Access Matrix
    There has been many functions of matrix throughout history but one of which is to represent protection as an abstract matrix which is called an access matrix. Rows on the access matrix represent domains and columns represent objects.

  7. Authentication
    Operating system (OS) authentication is a method for identifying an individual user with credentials supplied by the operating system of the user’s computer. These credentials can be the OS password or can include digital certificates in the user’s computer.

  8. Antivirus
    Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such.

  9. Memory Access Control
    MAC is defined as a system policy that makes even the root user cannot modify (unless the policy explicitly allows modifications or the system is rebooted, usually into an alternate configuration). The restrictions imposed by MAC policy rules are more powerful than the capabilities of the root user and can be used to make resources inaccessible to anyone but their intended owners.

  10. Protection
    Protection refers to a mechanism which controls the access of programs, processes, or users to the resources defined by a computer system. We can take protection as a helper to multi programming operating system, so that many users might safely share a common logical name space such as directory or files.