![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Exploration of Taxonomical Vulnerabilities in Operating System V
Subscribe/Renew Journal
Security in computer systems is important to ensure reliable operation and protect the integrity of stored information.Faults in the implementation can be a threat to security for instances like penetrating an operating. These faults must be identified, detected, and corrected to ensure reliability. Thereby, security assessment of a system stands critical and is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities and finding such unknown vulnerabilities remains a subjective process yet. The process can be improved by understanding the characteristics and nature of known vulnerabilities. The knowledge thus gained can be organized into a suitable taxonomy. This paper provides a significant work done developing taxonomies of vulnerabilities in Operating systems. The vulnerabilities inherent in the Operating system should be addressed appropriately, so they can be eliminated before accelerated by malicious software or hackers.
Keywords
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 286
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 1