

Exploration of Taxonomical Vulnerabilities in Operating System V
Abstract
Security in computer systems is important to ensure
reliable operation and protect the integrity of stored information.Faults in the implementation can be a threat to security for instances like penetrating an operating. These faults must be identified, detected, and corrected to ensure reliability. Thereby, security assessment of a system stands critical and is a difficult problem. Most of the current efforts in security assessment involve searching for known vulnerabilities and finding such unknown vulnerabilities
remains a subjective process yet. The process can be improved by understanding the characteristics and nature of known vulnerabilities. The knowledge thus gained can be organized into a suitable taxonomy. This paper provides a significant work done developing taxonomies of vulnerabilities in Operating systems. The vulnerabilities inherent in the Operating system should be addressed
appropriately, so they can be eliminated before accelerated by malicious software or hackers.
Keywords
References
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5374427.
https://hercules.citadel.com/docs/301VulGuide.pdf,Pagevisited 051104.
http://www.secpoint.com/what-is-vulnerability-assessment.html
http://documents.iss.net/whitepapers/nva.pdf.
http://en.wikipedia.org/wiki/Zero-day_exploit, page visited 061203.
http://www.saintcorporation.com/solutions/vulnerabilityScan.html
http://www.centos.org/docs/5/html/Deployment_Guide-en-US/ch-secaccess.
html
B.Marick, The craft of software testing, Prentice Hall.1995.
I. V. Krsul, Software Vulnerability Analysis, Ph.D. Thesis, Purdue
University, 1998.
www.symantec.com/connect/articles/vulnerability-assessment-survey.
Search security,
http://searchsecurity.techtarget.com/sDefinition/0, sid14_gci1176511,
html
R. Fussell, Vulnerability Assessment: Network based versus host based,
Technical report, SANS Institute, 2002.
Ivan Victor Krsul, Software Vulnerability Analysis, Unpublished
doctoral dissertation, Purdue University, IN, 1998.
U. Lindqvist and E. Jonsson, How to Systematically Classify
Computer Security Intrusions, Proceedings of the IEEE Symposium on
Security and Privacy, IEEE Computer Society Press, Los Alamitos,
CA, May 1997, pp. 154-163.
R. P. Abbot et al., Security Analysis and Enhancements of
Computer Operating Systems, In Technical Report NBSIR 76-1041,
Lawrence Livermore Laboratory, Institute for Computer Science and
Technology, 1976.
Peter G. Neumann and Donn B. Parker, A Summary of Computer
Misuse Techniques, In the Proceedings of 12th National Computer
Security Conference, Baltimore, 1989, pp. 396-407.
Aslam Taimur, A Taxonomy of Security Faults in the UNIX
operating system, Unpublished master‟s thesis, Purdue University, IN,
Matt Bishop and David Bailey, A Critical Analysis of Vulnerability
Taxonomies, Tech. Rep. CSE-96-11, Department of Computer Science,
University of California at Davis, 1996.
http://www.enggjournals.com/ijcse/abstract.html?file=12-04-02 -
,pp.224-234.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.