Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Specific set of tools and/or services for OS security

Category: English literature Paper Type: Report Writing Reference: APA Words: 7100

Introduction of Specific set of tools and/or services for OS security

In today’s era of technology, each of the hardware and device required particular operating systems to run it appropriately. Numbers of the devices are working in the market and each device has its numerous operating systems along with various specifications and features. These operating systems are also launched by the several companies. They are of the view that, by adopting this practice, they can better serving to their customers. Also, there is the possibility of having the customer’s feedback, which can better help the service providers to improve their services.

The problem of the security has become more complicated according to the model of the cloud as a new dimension, which has entered into the scope of the problem statements, which is related to the layers dependency tasks, model architecture, elasticity, and multi-tendency. There are a few general threats that must be avoided and observed. There are wide ranges of the users which are keening for the privacy and security of online data as well as the content of the web-based storage systems and the internets. It includes the user who is seeking for the creation of new sources and who has particularly stored sensitive resources and certain personal as well as the particular content for the web-based storage system. It will include access to the resources of the users [1].

Nowadays, in the presence of hackers and security threats information security system is quite important. Four major requirements of data security are authenticity, integrity. Confidentiality and availability. Organizations are having critical information and personal information of their customers (such as banks) ever tries to ensure an advanced level security system to prevent security risks. System hacks and security attacks not only cause to influence of goodwill or reputation of a company but also enforced a company to recollect their data from backups through spending huge budgets [2].

For every innovation, there exist the evils too. For operating systems, there exist various security challenges which make such operating systems less reliable. This thing can provide a company with a competitive advantage based on the fact of how efficiently the company has handled the security issues related to operating systems. Each company has their own operating systems for various devices and their relevant security challenges are also enhanced due to its various specifications and features of the operating systems.

This paper explores the various measures and specific set of tools and/or services that are particularly utilized for the security of OS. These tools are exploring in this paper along with its features and function by which it participates in securing the operating system and windows. Numbers of the companies are engaged in offering the numerous operating systems for several devices due to which its security challenges are increasing as well. This paper discuss the security tools of the numerous operating systems that are also concerned with various companies it includes the specific set of security tools for mac OS, Windows, UNIX and Linux These tools are one of the most important and essential elements for each operating system such as; Cisco Umbrella, Microsoft ATP. Each operating system has its own particular security tools in order to secure and save its data in effective manners.

1.1.Problem Statement of Specific set of tools and/or services for OS security

In today’s era of the latest and advanced technology, the businesses are intending to adopt various operating systems for their business practices. An operating system has become one of the most important features to run any hardware. Even the connection among the user and hardware always linked by the operating systems that are offered by the numerous company’s according to their specifications. It helps to bring ease in streamlining the business processes. The more effectively these online systems are used, the more they help the businesses to grow along with the revenue generation. The users of these operating systems might not have a technical background even they dint know what kind of the operating systems they are using for their devices. It is the limitation that they might not know how resolve the problems at the application level.

The significant issues are related to the security of the operating whereby the various queries and the information can be accessed by unauthorized users. It can harm both the goodwill and the market share of the company by disseminating the relevant particular information. The unprotected operating systems limit the business operation’s effectiveness & efficiency for using the particular devices. The security concerns of operating systems need to be considered as the first priority.

1.2.Aims and objectives of Specific set of tools and/or services for OS security

The current research work has the following aims and objectives:

·         To investigate the security concerns related to operating systems.

·         To provide the possible solutions for avoiding the security issues related to operating systems.

·         To provide future directions for the study topic based on the findings of the current research work.

1.3.Organization of the paper of Specific set of tools and/or services for OS security

After the introduction, the next part is related to the literature review about the study topic, i.e., security of the operating systems. In the next section, the methodology is included as a part. In the next part is the findings & the discussion of the results. Finally, the conclusion and the recommendations are given related to the web application’s security.

Literature review of Specific set of tools and/or services for OS security
This section of the research study will discuss the numerous particular set of security tools that are utilized for the Operating system. It offers various security features for protecting the Operating systems. This section explores the views of the numerous authors and researchers to explain such security tools that can be applied in the operating system. Numbers of enterprises are engaged in using such kinds of tools.

For the Current operating system, security is the most significant component. However, access to the control mechanism that helps to provide security. Considering these operations of Access Control mechanism windows most of the time prefer it on other systems. Two important approaches used for the purpose of monitoring access in the windows are presented below:

User-level access monitoring of Specific set of tools and/or services for OS security

            Allocated network resources can be secured by the access control as it only allows the authenticated users to access files or system [3]. It requires valid user names and passwords (recorded in the records of internet security providers) before granting authority.

Common-level access monitoring  of Specific set of tools and/or services for OS security

Resources can be also allocated by the simple way that is sharing the common resources for Full-access and read-only access [4]

Security measures implemented in Windows OS
Safe booting of Specific set of tools and/or services for OS security

A safe booting system is the basic requirement of all windows operating systems. The boot process is preservation is possible through the use of Trust platform module chip and Bit lockers. The operating system of Windows 7 retrieves the highly conventional system for basic input/output, as it is based on Unified Extensible Firmware Interface. By the mechanisms of the safe booting, the operating systems of the window are started. Form the unified interface of the extensible Firmware the operating systems of window 7 comes out. The method of BIOS is highly conventional.

Then the interface of the Unified Extensible Firmware, as well as Windows OS, combined the worked collected to create the sure, which prevents the hardware as well as the systems of low operating level for the unauthorized access [5].

Virtualization-based security of Specific set of tools and/or services for OS security

Virtualization-based security ensures alternations in the operating system. The subsystem is developed for delivering precise sub-systems, reserving, and protecting data of the operating system. Virtualization-based security is also known as the primary standard to ensure safety and security in all operating systems [3].

The threats landscape of cyber security is expanding with the passage of time. As technology is increasing it becomes more difficult to make secure the infrastructure of these particular systems.  Due to the increases in the threats, the users of the windows must be careful about the numerous features of the threats. It also includes a platform that is required for protecting the data of the various enterprises. It has been observed in the various studies that now day the enterprises are engaged in facing the numerous kinds of fishing attacks; It includes key loggers, ransomware, worms and spyware. The compromised accounts are also included in its [6].

There are various security measures that can easily use to solving the security issues of the Windows operating systems.

Windows Defender Smart Screen of Specific set of tools and/or services for OS security

According to Microsoft, at first sight, the smart screen of window defender can block easily. The employees can be protected by it if they are engaged in visiting the sites that are previously reported. It includes malware or pishing. It can be utilized to resist them from downloading those potentially malicious files. It is also utilized to protecting from unwanted and fake advertisements. It can drive-by attacks and scams the sites. This is considered as one of the multiple layers of defense in anti pishing as well as for the strategies of the malware protection.

Windows Defender Application Guard of Specific set of tools and/or services for OS security

The application guard is engaged in offering the particular protection against targeted and advanced threats that are usually launched edge of the Microsoft by utilizing the hyper of the of Microsoft. It also includes the Hyper-V virtualization technology. The works of functionality with the whitelisting is also included in it.  These are users who are designated trusted websites in order to browse freely.  In the event that a site isn't believed, Application Guard will open it in a compartment, totally blocking contact for local storage, memory, and various other installed applications that can corporate system endpoints. It also includes some other means of important interest for attackers.

User Account Control of Specific set of tools and/or services for OS security

The users are protected by the (user account protocol) UAC through the protection of the malware from damaging machine as well as it helps the organization for installing the effective and better-managed desktop. When the tasks and apps are allowed in this feature and these always run in the context of the security. It also includes the non-administrator account that is required for an administrator that is particularly authorized by the administrative level of access for the particular system.  The automatic installation of the unauthorized apps can block by it as well. The accidental change can prevent it from the settings of the system.

Windows Defender Device Guard of Specific set of tools and/or services for OS security

Benoit has said Application and Driver whitelisting are includes in Defender Device Guard. The element changes from a model where applications are believed except if obstructed by an antivirus arrangement towards a mode where the OS confides in just applications approved by an undertaking. It works on two segments: The main part (kernel-mode code integrity) KMCI shields bit mode procedures and drivers from zero-day assaults and different vulnerabilities by utilizing HVCI. The second, (user mode code integrity) UMCI is venture grade application whitelisting that accomplishes PC lockdown for endeavors utilizing just trusted applications.

Windows Defender Exploit Guard of Specific set of tools and/or services for OS security

Defender Exploit guard incorporates misuse security, assault surface decrease rules, arrange assurance, and controlled organizer get to. It additionally gives legacy application assurance, including self-assertive code monitor, blocking low-integrity pictures, blocking untrusted text styles, and sending out address sifting.

"This encourages you to review, arrange, and oversee Windows frameworks and application misuse alleviations," Benoit said. "It likewise conveys another class of capacities for interruption anticipation." 

Security measures implemented in mac OS

It has been reported in the various papers that there are two particular pieces of Mac malware that were being touted for the dark web. It has been stated by the security firm such as; Fortinet and AlienVault that there are few of the attachments that are not dangerous in macOS. There are the numbers of the standard antivirus that they have tested and these are able to detect the much ransom and mac spy. There are numerous security tools or measures that can be utilized for securing the data macOS [7].

Avast of Specific set of tools and/or services for OS security

Avast! is considered an antivirus programming suite that is genuinely famous. It can check your Mac with full-framework examines just as simplified outputs and peep/ look through messages, email connections, and outer hard drives. Intuitive outputs imply that you can move singular documents and organizers so as to check them. Avast is referred to as free for usage non-business purposes, in spite of the fact that when you introduce it. You’ll be reactive to likewise install or store Avast Online Security and Avast SecureLine VPN. The security of Avast online is $40 per product. The free release of their antivirus is more than fit for verifying your Mac [8].

Sophos Antivirus Home Edition of Specific set of tools and/or services for OS security

Sophos has an incredible bit of programming for securing your Mac. The custom output is also included in it that can be utilized or schedule according to the demands of the file of individuals. It also offers the additional tools that can be utilized in order to isolate and erase applications that Sophos believes are hazardous. Even the real-time scanning is existing in the Sophos, so the particular person can get a warning as there is any kind of dangerous occurs. Its use is preferably easy and it can tackle ineffective manners and remains my undisputed top choice all alone, Mac.

Malwarebytes Anti-Malware of Specific set of tools and/or services for OS security

These are particular tools that protect macOS from the attacks of the malware. It is also known as Anti Malware in the common language. The meaning of the program from anti-malware is to utilize it as an antivirus of the system. It has a property of on-demand scanning in order to adware. It includes spyware and various other forms of malware. This tool can be utilized for more persistent kinds of malware that cannot be avail by any kind of antivirus. The particular special features are not included in it. The real-time scanning is not included in it as well. But it is one of the most important security measures for macOS [9].

Block Block of Specific set of tools and/or services for OS security

This is an essential measure for the security of the macOS. It is able to stop and detect the Macransom and MacSpy both. These are considered as the two anti-malware tools that are only utilized for the protection of the Mac. They are designed by considering the real-time protection against the malware as well as offer real-time protection. It was designed to solving the security-related issues of the macOS. This is one of the most important useful tools in the market of today that is being utilized for security purposes. It operates by preventing the files from being encrypted in the first place.

Avira of Specific set of tools and/or services for OS security

Avira is actually an IT security company in Germany with over 30 years in history. It offers various services like software upgraders, VPN, and many others. However, the main focus in an antivirus application that scored highly by the individual labs. Moreover, they keep on optimizing. An upgraded version of it has also been offered by the team for 2019.

·         Compatible with macOS, iOS, Android, and Windows.

·         Fast and Light upgrades.

·         Pay attention to ransomware protection.

·         Free and premium models.

·         Includes US devices, downloads, and attachments.

·         Premium capabilities of cloud protection.

·         Repairing harmed files.

·         Limitless customer support

·         No advertisement

·         Mode of game

·         At the moment, Avira has a prominent position among the best antivirus applications.

·         Additionally, there are other distinctive features as well, which make it quite compatible.

·         Therefore, Avira is considered suitable for:

·         Malware protection and ransomware detection

·         Large organizations use it

·         Used at home

Security measures implemented in UNIX
Eset Internet Security
Definition of Specific set of tools and/or services for OS security

This is the one of the best and most reasonable antivirus that is selling in the market for the protections of the PC. The full and complete range of the protection is provided by the ESET along with high level performance. Few of the greater business solutions are also provided by this. It also offers apart from static virus protection along with the server security. The remote management is also offered by this. The parental controls is also includes in this. The particular tools of the ESET are particularly required for the Android, windows and Mac. 99 percent of the above than 300 malware sample is utilized for testing the various software’s of the antivirus for protecting the operating systems. In several other lab tests it scored more than average and it also provides valid and good solutions that can easily protect the laptop or systems.

Features of Specific set of tools and/or services for OS security

·         It has Vista by using the Windows 10.

·         It offers the various programs for the compatibility along with versions of the entire windows.

·         It offers the particular special packaging for Android, Mac and Linux.

·         It offers the protections of the high quality from various viruses such as; ransomware, malware and spyware.

·         It has features of e-mail scanning that are built-in in it.

·         The features of the automatic real time scanning is also involved in it

·         It offers the facility for the phishing protections.

·         For unwanted JS code it also offers protection for an AMSI module along with the quick detection.

·         The medium of the system is impacted by it.

·         For advanced protections an availability of the premium package is also includes in it.

Key Characteristics of Specific set of tools and/or services for OS security

·         The major characteristic of this is to offers the complete protections that include antispyware, ransom ware and antivirus.

·         Its cloud power is scanning

·         The multilingual customers are supported by it

·         It can operates the full power

·         It offers the trials of the 30-day

·         It provides the long list of the feature

·         The highly configurable devices are also includes in it

·         The protection for the network is also offered by it.

There are the various three editions of the Eset that is offering various features for the operating systems. It also has various pricing points. All of these aspects can be considered by keeping the numerous features along with the pricing and listing in mind. It has been concluded that the internet security edition of the Eset can be competed nominee for the best ad particular antivirus in the list of the 2019. The internet security of the Eset is builted on the NOD32 by which it has been offered the entire long list of the features that is contains on the protections of the botnet. It includes the various functions and features of the systems such as; protections of the payments and banking, webcam protection, scanner of the social media, anti-spam and firewall. In the interface, there are not nay kinds of the explicit module of the ransom ware but it has been ensured by the Eset for protection from the various ransomware.   It is considered as the one of the great antivirus software for the solutions of the business such as; protections of the server. It offers the great performance and supported to the multilingual customers. It has been proved that ESET is the one of the most important and perfect solutions for the business. Fe of the advanced features is also includes in it.     

Wireshark of Specific set of tools and/or services for OS security

The significant functionality of Wireshark tends to determine the security threats of the web servers. It is better done by performing of the black-box testing. This security tool works by making use of the payloads. Both the GET and the POST methods are supported by this software.

NMAP of Specific set of tools and/or services for OS security

It can be used for both the development of the web application as well as the software testing phase. This tool is developed in JAVA. It is used as both the scanner as well as the security tool. It also supports the manual testing of the UNIX [10].

Systweak Anti-Malware of Specific set of tools and/or services for OS security

Such kinds of the security tools that is usually known as the systweak Anti-Malware would be one of our first choices due to the lot of the robust functionalities that are usually offers in one package.  It is known as the resourceful software which keeps us safe from various kinds of the online threats. Such kinds of the software is usually used to efficiently detecting the quarantines and amp from suspicious amp. It also used unwanted content which can easily pose the threat on the Mac. It is also known as the powerful scanning algorithms that can make it easy for fighting off the few moments of the infections.  With the various tones of the features it comes loaded that can makes it best and important security software for the operations of the Mac. The protection against the malware can be completed by systweak antimalware for the operating systems if the Mac. It also used against the Torjan hiding, spyware, adware in the particular systems in order to ensure that it can remain secure against threats of the malicious. This industry particularly refers to the “PUP” that is potentially unwanted programs.  It is considered as the good security tool that can protect the functions and features of the Operating systems.

Security measures implemented in Linux

MISP of Specific set of tools and/or services for OS security

It is usually known as “Malware Information Sharing Platform”. It is perceived to be the best security tool. It is free of cost security tool. Also, it is an open source project from both the Source Forge and develops. The significant functionality of MISP tends determine the security threats of the Linux that is operating systems. It is better done by performing of the black-box testing. It is a command-line application. The users of MISP need to know about the basic commands in order to make use of MISP. Those who are familiar with the basic commands can make use of the MISP more easily as compared to those who are not familiar with the basic commands and are newcomers. For making use of MISP efficiently, the user guide is available that helps to know about the functionality of the software. This security tool works by making use of the payloads. Both the GET and the POST methods are supported by this software.

Functions of Specific set of tools and/or services for OS security

It helps to perform the following functions:

·         Detection of the command execution

·         Injection of CRLF

·         Injection to the specified database

·         Disclosure of the database

·         Bash bug or the shellshock

·         Server Side request forgery (SSRF)

·         Bypass for the weak .htaccess

·         Injection of XSS as well as XXE

Features of Specific set of tools and/or services for OS security

The distinguishing features of MISP are given below:

·         Different methods and the techniques are used for the authentication purposes. It includes the use of Kerberos and NTLM.

·         The distinguishing feature is the presence of the buster module.

·         It first targets the web servers and then allows for the brute force directories to be injected on the targeted web server in order to provide with the desired security of the web server.

·         It tends to provide the functionality like a fuzzer.

·         Both the GET and the POST methods are supported by this software.

·         Performs the black-box testing.

Archery of Specific set of tools and/or services for OS security

Archery or Archery Proxy is developed by Liux Operating systems. It is a security testing tool which is open source as well as multi-platform. For the Liux Operating systems, Archery Proxy is better used in order to find the varying vulnerabilities along with the security threats and the issues. It can be used for both the development of the Liux Operating systems as well as the software testing phase. It is helpful and easy to use tool from both the experienced professionals as well as the newcomers. In case of the advanced users, this tool supports the use of the command-line. This tool is developed in JAVA. It is used as both the scanner as well as the security tool. It also supports the manual testing of the Liux Operating systems.

Functions of Specific set of tools and/or services for OS security

It helps to perform the following functions:

§  Disclosure of the errors of the application.

§  SQL injection

§  XSS injection

§  Disclosure of private IP

§  For the rewrite of URL, making use of the Session ID

§  Cookie not HttpOnly flag

Features of Specific set of tools and/or services for OS security

The distinguishing features of Archery Proxy are given below:

§  Performing the automatic scan

§  Easier to use as compared to other security tools

§  Making use of the command-line

§  Easier for both the new comers and the professionals

§  Better supports for the authentication of the web application

§  AJAX spiders are used even if they rare traditional or the advanced one.

§  Restful APIs.

§  Multi-platform

Higher risk factors exist for the business entities as compared to anyone else or any other thing. When it comes for an enterprise then it can be perceives that the use of the complicated data structure and a lot of data movement. For the hackers it is easier to hack the business and transactional data by attacking their operating systems. The more large scale is the organization the increased there are the chances for the firms to have the threats and security related issues. The hackers tend to attack the big volumes of data and then convert it to the small volumes of the data in order to get the desired outcomes and the results.

            The security tools which are given in the current work are all about the identification of the threats and the security issues of the operating systems and the cyber security. These tools can better be used at the development phase in order to determine and eliminate the security threats and the issues. The other significant area for the security considerations include the testing of the code of the web application. It helps to know whether the code is encoded properly or not. The security testing is mainly focused on the areas as given: authentication, authorization, confidentiality, availability, non-reputation and the integrity as well.

The current era is all about the technological advancements. Mostly the businesses are carrying out their business operations by making use of the operating systems. These operating systems help to facilitate the business operations along with the provision of the efficiency as well as the accuracy for the firm’s operations.

The added benefits for making use of the operating systems include the increased revenues for the firm along with the increased customer count. The good will of the company also boosts up. In case, there exists the good doings exist for a thing, the bad doings also exist for the same. The major issue for making use of the operating systems is about the security concerns. The more their exists the operating systems the more there are chance for the reduced effort. It also affects the good will of the firm. For this purpose, the firms are required to take the measures that better help to identify the security related issues and help to reduce the same.

By making use of the operating systems the customer’s feedback can be attained. It helps to improve the organizational services. The concept of operating systems says that it is a kind of software that works in association of the remote servers in order to perform their operations effectively.

Most of the times, the use of the internet facilitates the use of the web applications. The only thing that differentiate the operating systems from the other applications is that the operating systems are not required to be installed rather they make use of the web servers for providing the users with the appropriate functionality.

The examples of the operating systems which are used worldwide include the Flicker, Mibbit, Face book as well as Wikipedia etc. The reliability of the operating systems is affected due to the security issues which make the operating systems less secure & reliable. The more an organization has the ability to handle the security issues in a better way the more that firm can have the competitive advantage in the market place. The security concerns are important for the users of the operating systems.

      As far as the innovation to the existing systems is concerned, then their exist the evils for the same. The reliability is harmed due to the operating systems security issues. The threats which are concerned with the operating systems are the key determinants for the performance of the web apps. They are evaluated as per the nature of the web applications. For the developers, there is an immense need to follow both the basic and the advanced standards in order to determine the security threats of the operating systems.

The security threats can better be identified at the testing phase of the development of the operating systems. It is to be considered as the most significant part for the development of the operating systems. By adopting this practice, the security threats can be identified as well as they can better be tackled. It makes the operating systems to show more reliability when it is launched actually for the functionality purposes.

The more the operating systems is passed through the testing, for the identification of the security threats, the more it makes the web application secure. For the said purpose, the buffer overflow, SQL injection, cross-site scripting, URL injection, cookie modification as well as file inclusion are important. These are actually the vulnerabilities which can harm the operating systems and affect their functionality. There is the possibility that the operating systems may face these threats. It is so because it is not possible to determine all the security issues while testing for the same.

It is significant to determine the operating system’s threats and the security issues because it affects both the operating system’s security as well as the business integrity. These security issues can be catered only in case there is proper understanding about the security threats and the issues. The better there understands about the security issues, related to the web applications; the more they can be tackled easily.

 Methodology of Specific set of tools and/or services for OS security

The numerous security development models of the various operating systems are investigated by the qualitative research methods, and this study is conducted by using the inductive research approach that leads towards the detailed analysis the various theories that are related to the particular topics. The qualitative research methods provide information related to the model utilization for the secure operating systems layers. It also includes several kinds of tools and security approaches that are developed by several researchers in their studies on this particular topic.

The secondary source of data collection is particularly used. It referred to the pre-existing data that is mostly related the operating systems securities. It includes journal articles, conference papers, books, research papers, news articles and sources of the websites. From the secondary sources of the data collections the qualitative research methods are used in order to conduct the research study on this particular topic of operating systems security tools.

 From the qualitative research methods observation method is employed in this research study for analyzing the securities tools of the various operating systems. The observation methods are good approach in order to analyze the studies of several authors because all of the studies are presented in the literature review for the securities tools of the various operating systems.

All of these studies most relevant to the topic and explores the concepts of aspects of the study by offering detail views on these particular topics. More than 150 research studies are explored for the said research worker, but only the most similar and best-suited studies are particularly used in this study.

It can be said the particular study is extracted from more than 150 publications by using the particular scientific sources. Such as ACM Digital Library, Scopus, IEEE Computer Society, Science Direct, Springer Link, ISI Web, and Google-Scholar. The Google-Scholar is mostly used for the various publications because it is considered as one of the most important platforms in order to search the various latest publications.  The most of the data for the security of the various operating systems has been collected by the numerous web links that are exploring the details about the operating systems as well as their relevant security tools.

After observations and investigation only 15 studies considered best studies for this research, which is based upon the well-defined exclusion and inclusion criteria. There are several keywords that are used for searching the relevant data in this study because these keywords are closely matched to the said research work and these are mostly used in this entire research in order to conduct the research study.

Results & discussions of Specific set of tools and/or services for OS security

The continuously increasing trend of data breaches is enforcing the organization to rethink about the dollars they spend on security systems. Organizations carry out their best efforts and spend huge budgets to ensure security system, but most of the time they fail to achieve security goals. Considering this failure, it is now the burning question of why and how such failures occur. A reported claim that more than 90% organizations (from the list of selected organizations for research) are stimulated (at different extent) by the data exfiltration.

Like other organization, Microsoft is also concerned with OS security. The security perimeter is the highly focused point of Microsoft organization that requires a large amount each year for security assurance. The main purpose behind the use of a security perimeter in Microsoft is to reject insider-attacks.

The approach of information security might be focused on the preserving of the information through its own along with the chaotic form.to control the security perimeter; the Microsoft Company spends a huge amount on it. For the rejection the inside attacks the security perimeter is constructed. For the hacker as well as attacker the important target is the private data. For the abstract of the highly delicate data, the hacker, as well as the attacker, has the ability for the security elements that are placed in the systems.

Data transfer performance and data processing system productivity can be enhanced and improved through the implementation of OS security architecture. Furthermore, it prohibits the risk of external attacks. OS use more than 1 security method. OS sometimes also reproduces several specific functions of the operating system that are linked with the physical record.

The main aim of using security tools is to test the security of Operating systems. It better helps to extract the flaws as well as the loopholes of the Operating systems at the developmental phase. Along with the preliminary testing, the security tools also help to test whether the security code in Operating systems is properly encoded or not. Following areas are mainly focused on security testing:

·         Authentication

·         Authorization

·         Availability

·         Confidentiality

·         Integrity

·         Non-reputation

Following security tools are the most widely used tools for testing the Operating systems and all of these tools are explored in the literature review of the study in extensive manners. These tools are;

·         Avast

·         Sophos Antivirus Home Edition

·         Malwarebytes Anti-Malware

·         Block Block

·         Avira

All of these above discuses tools are security tools of the Mac OS. Meanwhile the Security tools implemented in Windows OS are;

·         Windows Defender Smart Screen

·         Windows Defender Application Guard

·         User Account Control

·         Windows Defender Device Guard

·         Windows Defender Exploit Guard

The security tools that are particularly utilized in the UNIX are;

·         Eset Internet Security

·         Wireshark

·         NMAP

·         Systweak Anti-Malware

Cisco Umbrella of Specific set of tools and/or services for OS security

It has been observed that Cisco Umbrella is the best tool of the operating systems It Provides security to the operating system by utilizing hardware control of VBS, specifically working for the preservation of integral information on the operating systems of windows. The Cisco Umbrella is a highly protective component that explained the data as well as an application that is permitted to operate the specific computer. It is usually used to restoring the security benefits for the particular users and devices that are outside of the perimeter. It is usually used in the higher education industry, hospitality, and healthcare. Legal professional services enterprises are also engaged in utilizing this [11].

Microsoft ATP of Specific set of tools and/or services for OS security

Usually, it is known as the (Advanced Threat Protection ). It is considered as the cloud-based email filtering services that can help in order to protect the organization against unknown viruses and malware by offering robust zero-day protection. It also includes the features for the protection of your organization from numerous harmful skills in real-time.

Conclusion and Future work of Specific set of tools and/or services for OS security

The research paper project the security mechanism of the Microsoft organization. Furthermore, the research paper also brings into light the security process towards malicious attacks. Somehow, the scenario required to be taken into consideration is that attackers have the non-privileged account on systems; the attacker is unable to tamper a system physically; exploitable vulnerabilities do not exist, and attackers are unable to access the files.

It has been concluded that several kinds of the security tools are usually using for security of the numerous operating systems. Most important, this study discusses about the four important operating systems that are Windows, Mac, UNIX and Linux. These security tools are particularly used for protection of the all of the operating systems that are using by various organizations. The threats landscape of cyber security is expanding with the passage of time. As technology is increasing it becomes more difficult to make secure the infrastructure of these particular systems. 

It has been observed in the various studies that now day the enterprises are engaged in facing the numerous kinds of fishing attacks; It includes key loggers, ransomware, worms and spyware.

The application guard is engaged in offering the particular protection against targeted and advanced threats that are usually launched edge of the Microsoft by utilizing the hyper of the of Microsoft. It also includes the Hyper-V virtualization technology. The (user account protocol) UAC through the protection of the malware from damaging machine as well as it helps the organization for installing the effective and better-managed desktop.

Benoit has said Application and Driver whitelisting are includes in Defender Device. Avast! is considered an antivirus programming suite that is genuinely famous. It can check your Mac with full-framework examines just as simplified outputs and peep/ look through messages, email connections, and outer hard drives. These are particular tools that protect macOS from the attacks of the malware. It is also known as Anti Malware in the common language.

Block Block is an essential measure for the security of the macOS. It is able to stop and detect the Macransom and MacSpy both. It is considered as the one of the great antivirus software for the solutions of the business such as; protections of the server. It is known as the resourceful software which keeps us safe from various kinds of the online threats. This industry particularly refers to the “PUP” that is potentially unwanted programs. The security threats can better be identified at the testing phase of the development of the operating systems. It is to be considered as the most significant part for the development of the operating systems.

Future Work of Specific set of tools and/or services for OS security

For the case of the security of the operating systems the following needs to be taken into consideration for the purpose of the future work.

·         It is required to test for the security of the operating systems at both the development as well as the testing phase.

·         There is an immense need to take into consideration the security parameters of the operating systems.

·         The security of the operating systems can better be maintained by providing the proper guideline to the users of the operating systems.

·         The strictness to the rules and the regulations is required regarding the authentication and the authorization of the users for the operating systems.

·         The authentication and the authorization of the users of the operating systems need to follow the strict rules in order to maintain the security of the operating systems.

By following the above said measures, the security of the operating systems can better be maintained. In this way the firms can provide the efficient services.

References of Specific set of tools and/or services for OS security

[1]

R. N. Chritopher Steel, Core Security Patterns: Best Practices and Strategies for J2EE", Web Services, and Identity Management, Pearson Education India, , 2006.

[2]

T. Jaeger, Operating System Security, Morgan & Claypool Publishers, , 2008.

[3]

T. Stergiou, M. Leeson and R. Green, "An alternative architectural framework to the OSI security model," Computers & Security, vol. 23, no. 2, pp. 137-153, 2004.

[4]

A. Yadav, "Review on Database Access Control Mechanisms andand Models," International Journal of Computer Applications, vol. 120, no. 18, pp. 21-24, 2015.

[5]

W. B. B. H. G. S. K. B. Charles Edge, Enterprise Mac Security: Mac OS X Snow Leopard, Apress, 2010.

[6]

Securityinabox Org, "BASIC SECURITY FOR WINDOWS," 2016. [Online]. Available: https://securityinabox.org/en/guide/basic-security/windows/.

[7]

Defcon Org, "Mac OS X Security," 2019. [Online]. Available: https://www.defcon.org/images/defcon-14/dc-14-presentations/DC-14-Edge-Security.pdf.

[8]

Sectools Org, "SecTools.Org: Top 125 Network Security Tools," 2019. [Online]. Available: https://sectools.org/tag/os-x/.

[9]

Lasr Cs Ucla Edu, "Security for Operating Systems," 2019. [Online]. Available: https://lasr.cs.ucla.edu/classes/111_security_chapters/Security_for_Operating_Systems.pdf.

[10]

K. Poojary, "10 Linux security tools for system administrators," Computer waekly, 2018.

[11]

Umbrella cisco, "Security at scale," 2020. [Online]. Available: https://umbrella.cisco.com/use-cases/by-industry.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed