The Concepts of the Operating System and How They Are Vulnerable to Exploitation

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Introduction

This is a detailed report focusing on the concept of the operating systems (OS) services or the daemons and how they tend to be susceptible to various manipulations. Vulnerabilities refer to a property of an asset or its design that supports a menace to manifest. The vulnerabilities in an operating system (OS) or implementation might arise due to various factors, such as defects in the application, whereby a software code defect might enable a malicious program to gain access to the system and seize a specified command. Apps are only authorized to view the platform in legal and approved methods. A daemon is computer software that operates instead of is controlled directly by an increased range of motion in multifunctional system software packages.

The Linux daemons

The Linux or UNIX system consists of a daemon, which runs on a computer. Various daemons are found within the Linux system (Claes, 2015). Most of the daemons in Linux terminate with the letter d. To begin with, Linux consists of the systemd daemon whose principal purpose is to unify operations configuration and functionality throughout all Linux distros. In addition, the login daemon is a small daemon that keeps track of user login details and works in a variety of methods.

The vulnerabilities/exploits can cause the daemons to harm an operating system (OS) or its functions

The vulnerabilities in Linux are of different types based on the impacts generated on their exploitation. Privilege escalation is a vulnerability that involves obtaining privileged control over any resources ordinarily safeguarded from the client or applications by leveraging a technical fault, defect or setup error in a piece of software or system component. As a result, a program with more access than the systems analyst or programmer anticipated can do unintended activities (Zerouali, 2019). The systemd daemon is affected as they are forced to function abnormally, which creates an increased rate of errors in the programs under operation.

The Denial of Service vulnerability (DoS) is the premeditated use of internet protocol deployment defects or the near exhaustion of the malicious activities entity’s assets, intending to prevent the destination computer network from providing network services or access to specified services, the intended platform from responding or even leading to the collapsing of the operating systems (Legay, 2020). Denial of service vulnerability makes any application inaccessible based on the function it was designed for. This affects the logind daemon, preventing legitimate clients from using the specified design (Gonzalez-Barahona, 2017). The internet protocol (IP) spoofing may generate the IP packets with high modifications, which may end up hiding the identity of the senders to satirize the functioning of another computer. This is mainly generated by an increased rate of assaults of the denial of service.

Conclusion

It can be summed up that the increased rate of the vulnerabilities within the Linux systems needs to be lowered to ensure that the system runs appropriately. The Linux within the daemons needs to be checked to ensure that they are always inappropriate. Daemons are very crucial because they help in monitoring the various systems and ensuring that the operating systems (OS) perform all the various tasks appropriately. It is advised that individuals may use the Linux operating system because it is more secure, and that is an open-sourced OS whereby the source code is usually present to all the users. Linux as an operating system is easy to customize; hence the users can make any modifications in their interest.

References

Claes, M., Mens, T., Di Cosmo, R., & Vouillon, J. (2015). A historical analysis of debian package incompatibilities. In 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (pp. 212-223).

Zerouali, A., Mens, T., Gonzalez‐Barahona, J., Decan, A., Constantinou, E., & Robles, G. (2019). A formal framework for measuring technical lag in component repositories—and its application to npm. Journal of Software: Evolution and Process, 31(8), e2157.

Legay, D., Decan, A., & Mens, T. (2020). On package freshness in Linux distributions. In 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 682-686). IEEE.

Gonzalez-Barahona, J. M., Sherwood, P., Robles, G., & Izquierdo, D. (2017). Technical lag in software compilations: Measuring how outdated a software deployment is. In IFIP International Conference on Open Source Systems (pp. 182-192). Springer, Cham.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!