Discuss three sources of exposure (threats) to the operating system.

What will be an ideal response?


1. Privileged personnel who abuse their authority. Systems administrators and systems programmers require unlimited access to the operating system to perform maintenance and to recover from system failures. Such individuals may use this authority to access users' programs and data files.
2. Individuals both internal and external to the organization who browse the operating system to identify and exploit security flaws.
3. Individuals who intentionally (or accidentally) insert computer viruses or other forms of destructive programs into the operating system.

PTS: 1

Computer Science & Information Technology

You might also like to view...

Explain how a company can systematically determine what project requests get approved and which ones do not. How can they prioritize the projects that are approved?

What will be an ideal response?

Computer Science & Information Technology

Printer technologies produce characters and graphics as a series of small ____.

A. squares B. dots C. spots D. characters

Computer Science & Information Technology

Object ____ makes a new object available to a program.

A. orientation B. definition C. instantiation D. access

Computer Science & Information Technology

The intersection of each row and column is called a(n) ____.

A. place holder B. object C. cell D. box

Computer Science & Information Technology