Computer Science: An Overview: Global Edition (12th Edition)

Published by Pearson Higher Education
ISBN 10: 1292061162
ISBN 13: 978-1-29206-116-0

Chapter 3 - Operating Systems - Chapter Review Problems - Page 166: 50

Answer

See explanation

Work Step by Step

1. Attacks from outside, stopped by the OS's use of admin credentials 2. Attacks from inside, such as by "tricking" the memory manger into letting a process store both upper and lower limits of a process's allotted memory area. The OS 's use of privileged levels can stop this. 3. Attacks from inside using "sniffing software," which can record activities and data (e.g., a keystroke recorder) and send them outside. Privilege levels and admin accounts that maintain security procedures can stop this. Good human security, like identifying phishing attacks, is the most effective way to stop this method.
Update this answer!

You can help us out by revising, improving and updating this answer.

Update this answer

After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.