The Concepts of the Operating System and How They Are Vulnerable to Exploitation Essay

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

This is a detailed report focusing on the concept of the operating systems (OS) services or the daemons and how they tend to be susceptible to various manipulations. Vulnerabilities refer to a property of an asset or its design that supports a menace to manifest. The vulnerabilities in an operating system (OS) or implementation might arise due to various factors, such as defects in the application, whereby a software code defect might enable a malicious program to gain access to the system and seize a specified command. Apps are only authorized to view the platform in legal and approved methods. A daemon is computer software that operates instead of is controlled directly by an increased range of motion in multifunctional system software packages.

We will write a custom essay on your topic a custom Essay on The Concepts of the Operating System and How They Are Vulnerable to Exploitation
808 writers online

The Linux daemons

The Linux or UNIX system consists of a daemon, which runs on a computer. Various daemons are found within the Linux system (Claes, 2015). Most of the daemons in Linux terminate with the letter d. To begin with, Linux consists of the systemd daemon whose principal purpose is to unify operations configuration and functionality throughout all Linux distros. In addition, the login daemon is a small daemon that keeps track of user login details and works in a variety of methods.

The vulnerabilities/exploits can cause the daemons to harm an operating system (OS) or its functions

The vulnerabilities in Linux are of different types based on the impacts generated on their exploitation. Privilege escalation is a vulnerability that involves obtaining privileged control over any resources ordinarily safeguarded from the client or applications by leveraging a technical fault, defect or setup error in a piece of software or system component. As a result, a program with more access than the systems analyst or programmer anticipated can do unintended activities (Zerouali, 2019). The systemd daemon is affected as they are forced to function abnormally, which creates an increased rate of errors in the programs under operation.

The Denial of Service vulnerability (DoS) is the premeditated use of internet protocol deployment defects or the near exhaustion of the malicious activities entity’s assets, intending to prevent the destination computer network from providing network services or access to specified services, the intended platform from responding or even leading to the collapsing of the operating systems (Legay, 2020). Denial of service vulnerability makes any application inaccessible based on the function it was designed for. This affects the logind daemon, preventing legitimate clients from using the specified design (Gonzalez-Barahona, 2017). The internet protocol (IP) spoofing may generate the IP packets with high modifications, which may end up hiding the identity of the senders to satirize the functioning of another computer. This is mainly generated by an increased rate of assaults of the denial of service.

Conclusion

It can be summed up that the increased rate of the vulnerabilities within the Linux systems needs to be lowered to ensure that the system runs appropriately. The Linux within the daemons needs to be checked to ensure that they are always inappropriate. Daemons are very crucial because they help in monitoring the various systems and ensuring that the operating systems (OS) perform all the various tasks appropriately. It is advised that individuals may use the Linux operating system because it is more secure, and that is an open-sourced OS whereby the source code is usually present to all the users. Linux as an operating system is easy to customize; hence the users can make any modifications in their interest.

References

Claes, M., Mens, T., Di Cosmo, R., & Vouillon, J. (2015). A historical analysis of debian package incompatibilities. In 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (pp. 212-223).

Zerouali, A., Mens, T., Gonzalez‐Barahona, J., Decan, A., Constantinou, E., & Robles, G. (2019). A formal framework for measuring technical lag in component repositories—and its application to npm. Journal of Software: Evolution and Process, 31(8), e2157.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Legay, D., Decan, A., & Mens, T. (2020). On package freshness in Linux distributions. In 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 682-686). IEEE.

Gonzalez-Barahona, J. M., Sherwood, P., Robles, G., & Izquierdo, D. (2017). Technical lag in software compilations: Measuring how outdated a software deployment is. In IFIP International Conference on Open Source Systems (pp. 182-192). Springer, Cham.

Print
Need an custom research paper on The Concepts of the Operating System and How They Are Vulnerabl... written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, December 30). The Concepts of the Operating System and How They Are Vulnerable to Exploitation. https://ivypanda.com/essays/the-concepts-of-the-operating-system-and-how-they-are-vulnerable-to-exploitation/

Work Cited

"The Concepts of the Operating System and How They Are Vulnerable to Exploitation." IvyPanda, 30 Dec. 2022, ivypanda.com/essays/the-concepts-of-the-operating-system-and-how-they-are-vulnerable-to-exploitation/.

References

IvyPanda. (2022) 'The Concepts of the Operating System and How They Are Vulnerable to Exploitation'. 30 December.

References

IvyPanda. 2022. "The Concepts of the Operating System and How They Are Vulnerable to Exploitation." December 30, 2022. https://ivypanda.com/essays/the-concepts-of-the-operating-system-and-how-they-are-vulnerable-to-exploitation/.

1. IvyPanda. "The Concepts of the Operating System and How They Are Vulnerable to Exploitation." December 30, 2022. https://ivypanda.com/essays/the-concepts-of-the-operating-system-and-how-they-are-vulnerable-to-exploitation/.


Bibliography


IvyPanda. "The Concepts of the Operating System and How They Are Vulnerable to Exploitation." December 30, 2022. https://ivypanda.com/essays/the-concepts-of-the-operating-system-and-how-they-are-vulnerable-to-exploitation/.

Powered by CiteTotal, reference generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1