Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Exploration of Taxonomical Vulnerabilities in Operating System V


Affiliations
1 Anna University of Technology, Tiruchirappalli, India
     

   Subscribe/Renew Journal


Security in computer systems is important to ensure reliable operation and protect the integrity of stored information.Faults in the implementation can be a threat to security for instances like penetrating an operating. These faults must be identified, detected, and corrected to ensure reliability. Thereby, security assessment of a system stands critical and is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities and finding such unknown vulnerabilities remains a subjective process yet. The process can be improved by understanding the characteristics and nature of known vulnerabilities. The knowledge thus gained can be organized into a suitable taxonomy. This paper provides a significant work done developing taxonomies of vulnerabilities in Operating systems. The vulnerabilities inherent in the Operating system should be addressed appropriately, so they can be eliminated before accelerated by malicious software or hackers.


Keywords

Software Engineering, Fault Injection, Attack Injection, Vulnerability Assessment, Taxonomies.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 175

PDF Views: 1




  • Exploration of Taxonomical Vulnerabilities in Operating System V

Abstract Views: 175  |  PDF Views: 1

Authors

A. Ramachandran
Anna University of Technology, Tiruchirappalli, India
S. Ramachandran
Anna University of Technology, Tiruchirappalli, India
A. Sathiyaraj
Anna University of Technology, Tiruchirappalli, India

Abstract


Security in computer systems is important to ensure reliable operation and protect the integrity of stored information.Faults in the implementation can be a threat to security for instances like penetrating an operating. These faults must be identified, detected, and corrected to ensure reliability. Thereby, security assessment of a system stands critical and is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities and finding such unknown vulnerabilities remains a subjective process yet. The process can be improved by understanding the characteristics and nature of known vulnerabilities. The knowledge thus gained can be organized into a suitable taxonomy. This paper provides a significant work done developing taxonomies of vulnerabilities in Operating systems. The vulnerabilities inherent in the Operating system should be addressed appropriately, so they can be eliminated before accelerated by malicious software or hackers.


Keywords


Software Engineering, Fault Injection, Attack Injection, Vulnerability Assessment, Taxonomies.