Introduction of Specific set of tools
and/or services for OS security
In
today’s era of technology, each of the hardware and device required particular
operating systems to run it appropriately. Numbers of the devices are working in
the market and each device has its numerous operating systems along with
various specifications and features. These operating systems are also launched
by the several companies. They are of the view that, by adopting this practice,
they can better serving to their customers. Also, there is the possibility of
having the customer’s feedback, which can better help the service providers to
improve their services.
The
problem of the security has become more complicated according to the model of
the cloud as a new dimension, which has entered into the scope of the problem
statements, which is related to the layers dependency tasks, model
architecture, elasticity, and multi-tendency. There are a few general threats
that must be avoided and observed. There are wide ranges of the users which are
keening for the privacy and security of online data as well as the content of
the web-based storage systems and the internets. It includes the user who is
seeking for the creation of new sources and who has particularly stored
sensitive resources and certain personal as well as the particular content for
the web-based storage system. It will include access to the resources of the
users [1].
Nowadays,
in the presence of hackers and security threats information security system is
quite important. Four major requirements of data security are authenticity,
integrity. Confidentiality and availability. Organizations
are having critical information and personal information of their
customers (such as banks) ever tries to ensure an advanced level security
system to prevent security risks. System hacks and security attacks not only
cause to influence of goodwill or reputation of a company but also enforced a
company to recollect their data from backups through spending huge budgets [2].
For
every innovation, there exist the evils too. For operating systems, there exist
various security challenges which make such operating systems less reliable.
This thing can provide a company with a competitive advantage based on the fact
of how efficiently the company has handled the security issues related to
operating systems. Each company has their own operating systems for various
devices and their relevant security challenges are also enhanced due to its
various specifications and features of the operating systems.
This
paper explores the various measures and specific set of tools and/or services that are particularly utilized for the
security of OS. These tools are exploring in this paper along with its features
and function by which it participates in securing the operating system and
windows. Numbers of the companies are engaged in offering the numerous
operating systems for several devices due to which its security challenges are
increasing as well. This paper discuss the security tools of the numerous
operating systems that are also concerned with various companies it includes
the specific set of security tools for mac OS, Windows, UNIX and Linux These tools
are one of the most important and essential elements for each operating system
such as; Cisco Umbrella, Microsoft
ATP. Each operating system has its own particular security tools in order to
secure and save its data in effective manners.
1.1.Problem
Statement of
Specific set of tools and/or services for OS security
In
today’s era of the latest and advanced technology, the businesses are intending
to adopt various operating systems for their business practices. An operating
system has become one of the most important features to run any hardware. Even
the connection among the user and hardware always linked by the operating
systems that are offered by the numerous company’s according to their
specifications. It helps to bring ease in streamlining the business processes.
The more effectively these online systems are used, the more they help the
businesses to grow along with the revenue generation. The users of these
operating systems might not have a technical background even they dint know
what kind of the operating systems they are using for their devices. It is the
limitation that they might not know how resolve the problems at the application
level.
The
significant issues are related to the security of the operating whereby the
various queries and the information can be accessed by unauthorized users. It
can harm both the goodwill and the market share of the company by disseminating
the relevant particular information. The unprotected operating systems limit
the business operation’s effectiveness & efficiency for using the
particular devices. The security concerns of operating systems need to be
considered as the first priority.
1.2.Aims
and objectives of Specific set of tools and/or services for OS security
The
current research work has the following aims and objectives:
·
To investigate the security concerns
related to operating systems.
·
To provide the possible solutions for
avoiding the security issues related to operating systems.
·
To provide future directions for the study
topic based on the findings of the current research work.
1.3.Organization
of the paper of
Specific set of tools and/or services for OS security
After
the introduction, the next part is related to the literature review about the
study topic, i.e., security of the operating systems. In the next section, the
methodology is included as a part. In the next part is the findings & the
discussion of the results. Finally, the conclusion and the recommendations are
given related to the web application’s security.
Literature review of Specific set of
tools and/or services for OS security
This section of the research study will
discuss the numerous particular set of security tools that are utilized for the
Operating system. It offers various security features for protecting the
Operating systems. This section explores the views of the numerous authors and
researchers to explain such security tools that can be applied in the operating
system. Numbers of enterprises are engaged in using such kinds of tools.
For
the Current operating system, security is
the most significant component. However, access
to the control mechanism that helps to provide security. Considering these operations of Access Control mechanism
windows most of the time prefer it on other systems. Two important approaches
used for the purpose of monitoring access in the windows are presented below:
User-level access monitoring
of Specific set of tools and/or services for OS security
Allocated network resources can be
secured by the access control as it only allows the authenticated users to
access files or system [3]. It requires valid
user names and passwords (recorded in the records of internet security
providers) before granting authority.
Common-level
access monitoring
of Specific set of tools and/or services for OS security
Resources can be also allocated by the simple way that is
sharing the common resources for Full-access and read-only access [4].
Security measures implemented in Windows OS
Safe booting of Specific set of tools and/or
services for OS security
A safe booting
system is the basic requirement of all windows operating systems. The boot
process is preservation is possible through the use of Trust platform module
chip and Bit lockers. The operating system of Windows 7 retrieves the highly
conventional system for basic input/output, as it is based on Unified
Extensible Firmware Interface. By the mechanisms of the safe booting, the operating systems of the window are started. Form the unified interface of the
extensible Firmware the operating systems of window 7 comes out. The method of
BIOS is highly conventional.
Then the
interface of the Unified Extensible
Firmware, as well as Windows OS, combined the worked collected to create the
sure, which prevents the hardware as well as the systems of low operating level
for the unauthorized access [5].
Virtualization-based
security of Specific set of tools and/or
services for OS security
Virtualization-based
security ensures alternations in the operating system. The subsystem is developed
for delivering precise sub-systems, reserving, and protecting data of the
operating system. Virtualization-based security is also known as the primary
standard to ensure safety and security in all operating systems [3].
The threats landscape of
cyber security is expanding with the passage of time. As technology is
increasing it becomes more difficult to make secure the infrastructure of these
particular systems. Due to the increases
in the threats, the users of the windows must be careful about the numerous
features of the threats. It also includes a platform that is required for
protecting the data of the various enterprises. It has been observed in the
various studies that now day the enterprises are engaged in facing the numerous
kinds of fishing attacks; It includes key loggers, ransomware, worms and
spyware. The compromised accounts are also included in its [6].
There are various security measures that can
easily use to solving the security issues of the Windows operating systems.
Windows Defender Smart Screen
of Specific
set of tools and/or services for OS security
According to Microsoft, at first sight, the smart screen of window
defender can block easily. The employees can be protected by it if they are
engaged in visiting the sites that are previously reported. It includes malware
or pishing. It can be utilized to resist them from downloading those
potentially malicious files.
It is also utilized to protecting from unwanted and fake advertisements. It can
drive-by attacks and scams the sites. This is considered as one of the multiple
layers of defense in anti pishing as well as for the strategies of the malware
protection.
Windows Defender Application Guard
of Specific
set of tools and/or services for OS security
The application guard is engaged in offering the particular protection
against targeted and advanced threats that are usually launched edge of the
Microsoft by utilizing the hyper of the of Microsoft. It also includes the
Hyper-V virtualization technology. The works of functionality with the
whitelisting is also included in it.
These are users who are designated trusted websites in order to browse
freely. In the event that
a site isn't believed, Application Guard will open it in a compartment, totally
blocking contact for local storage, memory, and various other installed
applications that can corporate system endpoints. It also includes some other
means of important interest for attackers.
User Account Control of Specific
set of tools and/or services for OS security
The users are protected by the (user account protocol) UAC through the
protection of the malware from damaging machine as well as it helps the
organization for installing the effective and better-managed desktop. When the
tasks and apps are allowed in this feature and these always run in the context
of the security. It also includes the non-administrator account that is
required for an administrator that is particularly authorized by the
administrative level of access for the particular system. The automatic installation of the
unauthorized apps can block by it as well. The accidental change can prevent it
from the settings of the system.
Windows Defender Device Guard
of Specific
set of tools and/or services for OS security
Benoit
has said Application and Driver whitelisting are includes in Defender Device
Guard. The element changes from a model where applications are believed except
if obstructed by an antivirus arrangement towards a mode where the OS confides
in just applications approved by an undertaking. It works on two segments: The
main part (kernel-mode
code integrity) KMCI shields bit mode procedures and
drivers from zero-day assaults and different vulnerabilities by utilizing HVCI.
The second, (user mode
code integrity) UMCI is venture grade application
whitelisting that accomplishes PC lockdown for endeavors utilizing just trusted
applications.
Windows Defender Exploit Guard
of Specific
set of tools and/or services for OS security
Defender Exploit guard incorporates misuse security, assault surface
decrease rules, arrange assurance, and controlled organizer get to. It
additionally gives legacy application assurance, including self-assertive code monitor, blocking
low-integrity pictures, blocking untrusted text styles, and sending out address
sifting.
"This encourages you to
review, arrange, and oversee Windows frameworks and application misuse
alleviations," Benoit said. "It likewise conveys another class of
capacities for interruption anticipation."
Security measures implemented in mac OS
It has been reported in the various
papers that there are two particular pieces of Mac malware that were being
touted for the dark web. It has been stated by the security firm such as;
Fortinet and AlienVault that there are few of the attachments that are not
dangerous in macOS. There are the numbers of the standard antivirus that they
have tested and these are able to detect the much ransom and mac spy. There are
numerous security tools or measures that can be utilized for securing the data
macOS [7].
Avast of
Specific set of tools and/or services for OS security
Avast! is considered an antivirus
programming suite that is genuinely famous. It can check your Mac with full-framework
examines just as simplified outputs and peep/ look through messages, email
connections, and outer hard drives. Intuitive outputs imply that you can move
singular documents and organizers so as to check them. Avast is referred to as
free for usage non-business purposes, in spite of the fact that when you
introduce it. You’ll be reactive to likewise install or store Avast Online
Security and Avast SecureLine VPN. The security of Avast online is $40 per
product. The free release of their antivirus is more than fit for verifying
your Mac [8].
Sophos Antivirus Home Edition of
Specific set of tools and/or services for OS security
Sophos has an incredible bit of
programming for securing your Mac. The custom output is also included in it
that can be utilized or schedule according to the demands of the file of
individuals. It also offers the additional tools that can be utilized in order
to isolate and erase applications that Sophos believes are hazardous. Even the
real-time scanning is existing in the Sophos, so the particular person can get
a warning as there is any kind of dangerous occurs. Its use is preferably easy
and it can tackle ineffective manners and remains my undisputed top choice all
alone, Mac.
Malwarebytes Anti-Malware of
Specific set of tools and/or services for OS security
These are particular tools that protect
macOS from the attacks of the malware. It is also known as Anti Malware in the
common language. The
meaning of the program from anti-malware is to utilize it as an antivirus of
the system. It has a property of on-demand scanning in order to adware. It
includes spyware and various other forms of malware. This tool can be utilized
for more persistent kinds of malware that cannot be avail by any kind of
antivirus. The particular special features are not included in it. The
real-time scanning is not included in it as well. But it is one of the most
important security measures for macOS [9].
Block Block of
Specific set of tools and/or services for OS security
This is an essential measure for the
security of the macOS. It is able to stop and detect the Macransom and MacSpy
both. These are considered as the two anti-malware tools that are only utilized
for the protection of the Mac. They are designed by considering the real-time
protection against the malware as well as offer real-time protection. It was
designed to solving the security-related issues of the macOS. This is one of
the most important useful tools in the market of today that is being utilized
for security purposes. It operates by preventing the files from being encrypted
in the first place.
Avira of
Specific set of tools and/or services for OS security
Avira
is actually an IT security company in Germany with over 30 years in history. It
offers various services like software upgraders, VPN, and many others. However,
the main focus in an antivirus application that scored highly by the individual
labs. Moreover, they keep on optimizing. An upgraded version of it has also
been offered by the team for 2019.
·
Compatible
with macOS, iOS, Android, and Windows.
·
Fast
and Light upgrades.
·
Pay
attention to ransomware protection.
·
Free
and premium models.
·
Includes
US devices, downloads, and attachments.
·
Premium
capabilities of cloud protection.
·
Repairing
harmed files.
·
Limitless
customer support
·
No
advertisement
·
Mode
of game
·
At
the moment, Avira has a prominent position among the best antivirus
applications.
·
Additionally,
there are other distinctive features as well, which make it quite compatible.
·
Therefore,
Avira is considered suitable for:
·
Malware
protection and ransomware detection
·
Large
organizations use it
·
Used
at home
Security measures
implemented in UNIX
Eset Internet Security
Definition of Specific set of tools
and/or services for OS security
This is the one of the
best and most reasonable antivirus that is selling in the market for the
protections of the PC. The full and complete range of the protection is
provided by the ESET along with high level performance. Few of the greater
business solutions are also provided by this. It also offers apart from static
virus protection along with the server security. The remote management is also
offered by this. The parental controls is also includes in this. The particular
tools of the ESET are particularly required for the Android, windows and Mac.
99 percent of the above than 300 malware sample is utilized for testing the
various software’s of the antivirus for protecting the operating systems. In
several other lab tests it scored more than average and it also provides valid
and good solutions that can easily protect the laptop or systems.
Features of Specific set of tools
and/or services for OS security
·
It has Vista by using the Windows 10.
·
It offers the various programs for the compatibility along
with versions of the entire windows.
·
It offers the particular special packaging for Android, Mac
and Linux.
·
It offers the protections of the high quality from various
viruses such as; ransomware, malware and spyware.
·
It has features of e-mail scanning that are built-in in it.
·
The features of the automatic real time scanning is also
involved in it
·
It offers the facility for the phishing protections.
·
For unwanted JS code it also offers protection for an AMSI
module along with the quick detection.
·
The medium of the system is impacted by it.
·
For advanced protections an availability of the premium
package is also includes in it.
Key Characteristics of Specific set of tools
and/or services for OS security
·
The major characteristic of this is to offers the complete
protections that include antispyware, ransom ware and antivirus.
·
Its cloud power is scanning
·
The multilingual customers are supported by it
·
It can operates the full power
·
It offers the trials of the 30-day
·
It provides the long list of the feature
·
The highly configurable devices are also includes in it
·
The protection for the network is also offered by it.
There are the various
three editions of the Eset that is offering various features for the operating
systems. It also has various pricing points. All of these aspects can be
considered by keeping the numerous features along with the pricing and listing
in mind. It has been concluded that the internet security edition of the Eset
can be competed nominee for the best ad particular antivirus in the list of the
2019. The internet security of the Eset is builted on the NOD32 by which it has
been offered the entire long list of the features that is contains on the
protections of the botnet. It includes the various functions and features of
the systems such as; protections of the payments and banking, webcam
protection, scanner of the social media, anti-spam and firewall. In the
interface, there are not nay kinds of the explicit module of the ransom ware
but it has been ensured by the Eset for protection from the various
ransomware. It is considered as the one
of the great antivirus software for the solutions of the business such as;
protections of the server. It offers the great performance and supported to the
multilingual customers. It has been proved that ESET is the one of the most
important and perfect solutions for the business. Fe of the advanced features
is also includes in it.
Wireshark of Specific set of tools and/or
services for OS security
The significant functionality of Wireshark tends to determine the
security threats of the web servers. It is better done by performing of the
black-box testing. This security tool works by making use of the payloads. Both
the GET and the POST methods are supported by this software.
NMAP of Specific set of tools and/or services for OS
security
It can be used for both the development of the web application as well as
the software testing phase. This tool is developed in JAVA. It is used as both
the scanner as well as the security tool. It also supports the manual testing
of the UNIX [10].
Systweak Anti-Malware of
Specific set of tools and/or services for OS security
Such kinds of the security tools that is usually
known as the systweak Anti-Malware would be one of our first choices due to the
lot of the robust functionalities that are usually offers in one package. It is known as the resourceful software which
keeps us safe from various kinds of the online threats. Such kinds of the
software is usually used to efficiently detecting the quarantines and amp from
suspicious amp. It also used unwanted content which can easily pose the threat
on the Mac. It is also known as the powerful scanning algorithms that can make
it easy for fighting off the few moments of the infections. With the various tones of the features it
comes loaded that can makes it best and important security software for the
operations of the Mac. The protection against the malware can be completed by
systweak antimalware for the operating systems if the Mac. It also used against
the Torjan hiding, spyware, adware in the particular systems in order to ensure
that it can remain secure against threats of the malicious. This industry
particularly refers to the “PUP” that is potentially unwanted programs. It is considered as the good security tool
that can protect the functions and features of the Operating systems.
Security measures
implemented in Linux
MISP
of Specific set of tools and/or services for OS security
It is usually known as “Malware Information Sharing Platform”.
It is perceived
to be the best security tool. It is free of cost security tool. Also, it is an
open source project from both the Source Forge and develops. The significant
functionality of MISP tends determine the security threats of the Linux that is
operating systems. It is better done by performing of the black-box testing. It
is a command-line application. The users of MISP need to know about the basic
commands in order to make use of MISP. Those who are familiar with the basic
commands can make use of the MISP more easily as compared to those who are not
familiar with the basic commands and are newcomers. For making use of MISP
efficiently, the user guide is available that helps to know about the
functionality of the software. This security tool works by making use of the
payloads. Both the GET and the POST methods are supported by this software.
Functions of
Specific set of tools and/or services for OS security
It helps to perform the
following functions:
·
Detection of the command execution
·
Injection of CRLF
·
Injection to the specified database
·
Disclosure of the database
·
Bash bug or the shellshock
·
Server Side request forgery (SSRF)
·
Bypass for the weak .htaccess
·
Injection of XSS as well as XXE
Features of
Specific set of tools and/or services for OS security
The distinguishing
features of MISP are given below:
·
Different methods and the techniques are
used for the authentication purposes. It includes the use of Kerberos and NTLM.
·
The distinguishing feature is the
presence of the buster module.
·
It first targets the web servers and then
allows for the brute force directories to be injected on the targeted web
server in order to provide with the desired security of the web server.
·
It tends to provide the functionality
like a fuzzer.
·
Both the GET and the POST methods are
supported by this software.
·
Performs the black-box testing.
Archery of
Specific set of tools and/or services for OS security
Archery or Archery Proxy is developed by Liux
Operating systems. It is a security testing tool which is open source as well
as multi-platform. For the Liux Operating systems, Archery Proxy is better used
in order to find the varying vulnerabilities along with the security threats
and the issues. It can be used for both the development of the Liux Operating
systems as well as the software testing phase. It is helpful and easy to use
tool from both the experienced professionals as well as the newcomers. In case
of the advanced users, this tool supports the use of the command-line. This
tool is developed in JAVA. It is used as both the scanner as well as the
security tool. It also supports the manual testing of the Liux Operating
systems.
Functions of
Specific set of tools and/or services for OS security
It helps to perform the
following functions:
§ Disclosure
of the errors of the application.
§ SQL
injection
§ XSS
injection
§ Disclosure
of private IP
§ For
the rewrite of URL, making use of the Session ID
§ Cookie
not HttpOnly flag
Features of
Specific set of tools and/or services for OS security
The distinguishing
features of Archery Proxy are given
below:
§ Performing
the automatic scan
§ Easier
to use as compared to other security tools
§ Making
use of the command-line
§ Easier
for both the new comers and the professionals
§ Better
supports for the authentication of the web application
§ AJAX
spiders are used even if they rare traditional or the advanced one.
§ Restful
APIs.
§ Multi-platform
Higher
risk factors exist for the business entities as compared to anyone else or any
other thing. When it comes for an enterprise then it can be perceives that the
use of the complicated data structure and a lot of data movement. For the
hackers it is easier to hack the business and transactional data by attacking
their operating systems. The more large scale is the organization the increased
there are the chances for the firms to have the threats and security related
issues. The hackers tend to attack the big volumes of data and then convert it
to the small volumes of the data in order to get the desired outcomes and the
results.
The security tools which are given in the current work
are all about the identification of the threats and the security issues of the
operating systems and the cyber security. These tools can better be used at the
development phase in order to determine and eliminate the security threats and
the issues. The other significant area for the security considerations include
the testing of the code of the web application. It helps to know whether the
code is encoded properly or not. The security testing is mainly focused on the
areas as given: authentication, authorization, confidentiality, availability,
non-reputation and the integrity as well.
The current era is all about the
technological advancements. Mostly the businesses are carrying out their
business operations by making use of the operating systems. These operating
systems help to facilitate the business operations along with the provision of
the efficiency as well as the accuracy for the firm’s operations.
The added benefits for making use
of the operating systems include the increased revenues for the firm along with
the increased customer count. The good will of the company also boosts up. In
case, there exists the good doings exist for a thing, the bad doings also exist
for the same. The major issue for making use of the operating systems is about
the security concerns. The more their exists the operating systems the more
there are chance for the reduced effort. It also affects the good will of the
firm. For this purpose, the firms are required to take the measures that better
help to identify the security related issues and help to reduce the same.
By
making use of the operating systems the customer’s feedback can be attained. It
helps to improve the organizational services. The concept of operating systems
says that it is a kind of software that works in association of the remote
servers in order to perform their operations effectively.
Most
of the times, the use of the internet facilitates the use of the web
applications. The only thing that differentiate the operating systems from the
other applications is that the operating systems are not required to be
installed rather they make use of the web servers for providing the users with
the appropriate functionality.
The
examples of the operating systems which are used worldwide include the Flicker,
Mibbit, Face book as well as Wikipedia etc. The reliability of the operating
systems is affected due to the security issues which make the operating systems
less secure & reliable. The more an organization has the ability to handle
the security issues in a better way the more that firm can have the competitive
advantage in the market place. The security concerns are important for the
users of the operating systems.
As far as the innovation to the existing
systems is concerned, then their exist the evils for the same. The reliability
is harmed due to the operating systems security issues. The threats which are
concerned with the operating systems are the key determinants for the
performance of the web apps. They are evaluated as per the nature of the web
applications. For the developers, there is an immense need to follow both the
basic and the advanced standards in order to determine the security threats of
the operating systems.
The
security threats can better be identified at the testing phase of the
development of the operating systems. It is to be considered as the most
significant part for the development of the operating systems. By adopting this
practice, the security threats can be identified as well as they can better be
tackled. It makes the operating systems to show more reliability when it is
launched actually for the functionality purposes.
The
more the operating systems is passed through the testing, for the
identification of the security threats, the more it makes the web application
secure. For the said purpose, the buffer overflow, SQL injection, cross-site
scripting, URL injection, cookie modification as well as file inclusion are
important. These are actually the vulnerabilities which can harm the operating
systems and affect their functionality. There is the possibility that the
operating systems may face these threats. It is so because it is not possible
to determine all the security issues while testing for the same.
It
is significant to determine the operating system’s threats and the security issues because
it affects both the operating
system’s
security as well as the business integrity. These security issues can be
catered only in case there is proper understanding about the security threats
and the issues. The better there understands about the security issues, related
to the web applications; the more they can be tackled easily.
Methodology of Specific set of tools
and/or services for OS security
The numerous security development
models of the various operating systems are investigated by the qualitative
research methods, and this study is conducted by using the inductive research
approach that leads towards the detailed analysis the various theories that are
related to the particular topics. The qualitative research methods provide
information related to the model utilization for the secure operating systems
layers. It also includes several kinds of tools and security approaches that
are developed by several researchers in their studies on this particular topic.
The secondary source of data
collection is particularly used. It referred to the pre-existing data that is
mostly related the operating systems securities. It includes journal articles,
conference papers, books, research papers, news articles and sources of the
websites. From the secondary sources of the data collections the qualitative
research methods are used in order to conduct the research study on this
particular topic of operating systems security tools.
From the qualitative research methods
observation method is employed in this research study for analyzing the
securities tools of the various operating systems. The observation methods are
good approach in order to analyze the studies of several authors because all of
the studies are presented in the literature review for the securities tools of
the various operating systems.
All of these studies most relevant
to the topic and explores the concepts of aspects of the study by offering detail
views on these particular topics. More than 150 research studies are explored
for the said research worker, but only the most similar and best-suited studies
are particularly used in this study.
It can be said the particular
study is extracted from more than 150 publications by using the particular
scientific sources. Such as ACM Digital Library, Scopus, IEEE Computer Society,
Science Direct, Springer Link, ISI Web, and Google-Scholar. The Google-Scholar
is mostly used for the various publications because it is considered as one of
the most important platforms in order to search the various latest
publications. The most of the data for
the security of the various operating systems has been collected by the numerous
web links that are exploring the details about the operating systems as well as
their relevant security tools.
After observations and
investigation only 15 studies considered best studies for this research, which
is based upon the well-defined exclusion and inclusion criteria. There are several
keywords that are used for searching the relevant data in this study because
these keywords are closely matched to the said research work and these are
mostly used in this entire research in order to conduct the research study.
Results & discussions of Specific set of tools and/or services for OS security
The continuously increasing trend
of data breaches is enforcing the organization to rethink about the dollars
they spend on security systems. Organizations carry out their best efforts and
spend huge budgets to ensure security system, but most of the time they fail to
achieve security goals. Considering this failure, it is now the burning
question of why and how such failures occur. A reported claim that more than
90% organizations (from the list of selected organizations for research) are
stimulated (at different extent) by the data exfiltration.
Like other organization, Microsoft
is also concerned with OS security. The security perimeter is the highly
focused point of Microsoft organization that requires a large amount each year
for security assurance. The main purpose behind the use of a security perimeter
in Microsoft is to reject insider-attacks.
The approach of information
security might be focused on the preserving of the information through its own
along with the chaotic form.to control the security perimeter; the Microsoft
Company spends a huge amount on it. For the rejection the inside attacks the
security perimeter is constructed. For the hacker as well as attacker the
important target is the private data. For the abstract of the highly delicate
data, the hacker, as well as the attacker, has the ability for the security
elements that are placed in the systems.
Data transfer performance and data
processing system productivity can be enhanced and improved through the
implementation of OS security architecture. Furthermore, it prohibits the risk
of external attacks. OS use more than 1 security method. OS sometimes also
reproduces several specific functions of the operating system that are linked with
the physical record.
The main aim of using
security tools is to test the security of Operating systems. It better helps to
extract the flaws as well as the loopholes of the Operating systems at the
developmental phase. Along with the preliminary testing, the security tools
also help to test whether the security code in Operating systems is properly
encoded or not. Following areas are mainly focused on security testing:
·
Authentication
·
Authorization
·
Availability
·
Confidentiality
·
Integrity
·
Non-reputation
Following security tools are the most widely used tools for
testing the Operating systems and all of these tools are explored in the
literature review of the study in extensive manners. These tools are;
·
Avast
·
Sophos Antivirus Home Edition
·
Malwarebytes Anti-Malware
·
Block Block
·
Avira
All
of these above discuses tools are security tools of the Mac OS. Meanwhile the Security tools
implemented in Windows OS are;
·
Windows Defender Smart Screen
·
Windows Defender Application Guard
·
User Account Control
·
Windows Defender Device Guard
·
Windows Defender Exploit Guard
The
security tools that are particularly utilized in the UNIX are;
·
Eset Internet Security
·
Wireshark
·
NMAP
·
Systweak Anti-Malware
Cisco Umbrella of
Specific set of tools and/or services for OS security
It has been observed that Cisco
Umbrella is the best tool of the operating systems It Provides security to the
operating system by utilizing hardware control of VBS, specifically working for
the preservation of integral information on the operating systems of windows.
The Cisco Umbrella
is a highly protective component that explained the data as well as an application that is permitted to operate the
specific computer. It is usually used to restoring the security benefits for
the particular users and devices that are outside of the perimeter. It is
usually used in the higher education industry, hospitality, and healthcare.
Legal professional services enterprises are also engaged in utilizing this [11].
Microsoft ATP
of Specific set of
tools and/or services for OS security
Usually, it is known as the (Advanced Threat Protection ). It is
considered as the cloud-based email filtering services that can help in order
to protect the organization against unknown viruses and malware by offering
robust zero-day protection. It also includes the features for the protection of
your organization from numerous harmful skills in real-time.
Conclusion and Future work of Specific set of tools and/or services for OS security
The research paper project the
security mechanism of the Microsoft organization. Furthermore, the research
paper also brings into light the security process towards malicious attacks.
Somehow, the scenario required to be taken into consideration is that attackers
have the non-privileged account on systems; the attacker is unable to tamper a
system physically; exploitable vulnerabilities do not exist, and attackers are
unable to access the files.
It has been concluded
that several kinds of the security tools are usually using for security of the
numerous operating systems. Most important, this study discusses about the four
important operating systems that are Windows, Mac, UNIX and Linux. These
security tools are particularly used for protection of the all of the operating
systems that are using by various organizations. The threats landscape of cyber
security is expanding with the passage of time. As technology is increasing it
becomes more difficult to make secure the infrastructure of these particular
systems.
It has been observed in the various studies that
now day the enterprises are engaged in facing the numerous kinds of fishing
attacks; It includes key loggers, ransomware, worms and spyware.
The
application guard is engaged in offering the particular protection against
targeted and advanced threats that are usually launched edge of the Microsoft
by utilizing the hyper of the of Microsoft. It also includes the Hyper-V
virtualization technology. The (user account protocol) UAC through the
protection of the malware from damaging machine as well as it helps the
organization for installing the effective and better-managed desktop.
Benoit has said
Application and Driver whitelisting are includes in Defender Device.
Avast! is considered an antivirus
programming suite that is genuinely famous. It can check your Mac with
full-framework examines just as simplified outputs and peep/ look through
messages, email connections, and outer hard drives.
These are particular tools that
protect macOS from the attacks of the malware. It is also known as Anti Malware
in the common language.
Block Block is an
essential measure for the security of the macOS. It is able to stop and detect
the Macransom and MacSpy both. It is considered as the one of the great antivirus
software for the solutions of the business such as; protections of the server.
It is known
as the resourceful software which keeps us safe from various kinds of the
online threats. This industry particularly refers to the “PUP” that is potentially
unwanted programs. The security threats can better be identified at the
testing phase of the development of the operating systems. It is to be
considered as the most significant part for the development of the operating
systems.
Future
Work of Specific set of
tools and/or services for OS security
For
the case of the security of the operating systems the following needs to be
taken into consideration for the purpose of the future work.
·
It is required to test for the security
of the operating systems at both the development as well as the testing phase.
·
There is an immense need to take into
consideration the security parameters of the operating systems.
·
The security of the operating systems can
better be maintained by providing the proper guideline to the users of the
operating systems.
·
The strictness to the rules and the
regulations is required regarding the authentication and the authorization of
the users for the operating systems.
·
The authentication and the authorization
of the users of the operating systems need to follow the strict rules in order
to maintain the security of the operating systems.
By following the above said
measures, the security of the operating systems can better be maintained. In
this way the firms can provide the efficient services.