Metrics

  • citations in SCIndeks: 0
  • citations in CrossRef:0
  • citations in Google Scholar:[]
  • visits in previous 30 days:17
  • full-text downloads in 30 days:9

Contents

article: 2 from 2  
Back back to result list
2015, vol. 57, iss. 2, pp. 76-91
The vulnerability of operating systems to malicious programs
Criminology and Police Academy, Belgrade

emailkukkristijan@gmail.com
Keywords: operating systems; vulnerability; malicious program; boot sector viruses
Abstract
Although there are many things that need protection, the main ones are those that appear on the Internet. Many harmful programs instal themselves surreptitiously on the user’s computer and their infiltration cannot be influenced without proper protection. When this happens, it is usually too late and a thorough inspection of the whole computer is needed. Many viruses and hackers on many mobile devices are becoming an increasing problem in today’s protection of personal information. Viruses for mobile phones have been known for a long time, yet the majority of users of these devices infected with malware are not aware of the infection because they do not know for the existence of security vulnerabilities of their operating systems. This paper presents an overview of the corresponding operating systems that support encryption in relation to the selected mobile phone, which can lead to a greater level of security of the device. There are many different types of harmful software that affect the security of mobile devices as well as personal computer systems of users, such as viruses, Trojans, malware, bootkits and others. Master boot sector, the first sector of the hard disk in a computer system which contains the code needed to run the operating system is often the target of specific types of viruses called bootkits or rootkits. Since they are invisible to the operating system it is very difficult to remove them from an infected computer. Therefore the review of the existence of vulnerabilities in operating systems offered in this paper is an attempt at drawing attention to their possible attacks.
References
Čisar, P. (2013) System for detection intrusions into information infrastructure. Nauka, bezbednost, policija, vol. 18, br. 1, str. 113-128
Đikanović, P., Mojsilović, Ž. (2010) Primena SMART kartica kao identifikacionih dokumenata. Bezbednost, Beograd, vol. 52, br. 3, str. 139-157
Florio, E., Kasslin, K. (2008) Your computer is now stoned (... again!). Virus Bulletin
Giuliani, M. (2011) Removing Popureb Doesn ‘t Require a Windows Reinstall, weblog: Webroot. http://www.webroot.com/blog/2011/06/30/removing-popureb-doesnt-require-a-windows-reinstall
Krutz, R.L., Vines, R.D., Stroz, E.M. (2001) The CISSP Prep Guide: Mastering the Ten Domains of Computer Security. Chichester: John Wiley & Sons
Muthumanickam, K., Ilavarasan, E. (2014) Demanding Requirement of Security for Wireless Mobile Devices: A Survey. Research Journal of Applied Sciences, Engineering and Technology, 8(24): pp. 2381-2387
One, A. (1996) Smashing the Stack for Fun and Profit. Phrack, Vol. 7, Iss. 49
Pleskonjić, D., Maček, N., Đorđević, B., Carić, M. (2007) Sigurnost računarskih sistema i mreža. Beograd: Mikro knjiga
Ranđelović, D., Stojković, D. (2012) Possibilities of autopsy tool use for forensic purposes. Nauka, bezbednost, policija, vol. 17, br. 3, str. 19-33
Ranđelović, D., Delija, D., Popović, B. (2009) EnCase forenzički alat. Bezbednost, Beograd, vol. 51, br. 1-2, str. 286-312
Scarfone, K., Mell, P. (2009) The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities (DRAFT), NIST Interagency Report 7502 (Second Public Draft), Computer Security Division Information Technology Laboratory. Gaithersburg, MD: National Institute of Standards and Technology, 20899-8930
Shinder, D.L. (2002) Scene of the cybercrime: Computer forensics handbook. Rockland: Syngress Publishing
Sikorski, M., Honig, A. (2012) Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. San Francisco, CA
Silberschatz, A., Galvin, P.B., Gagne, G. (2004) Operating Systems Concepts. John Wiley & Sons, 7th Edn
Sinchak, S. (2004) Hacking Windows XP. Indianapolis: Wiley Publishing, Inc. Indiana
Smith, W.R. (2000) The Multi-Boot Configuration Handbook. Indianapolis: Que Publishing, Indiana, pp. 260-261
Szor, P. (2005) The Art of Computer Virus Research and Defense. Addison Wesley, Pearson Education, Symantec Press
Tanenbaum, S.A. (2012) Modern Operating System. USA: Prentice Hall, Learning Private Limited, 3rd Edn
Veinović, M., Ćajić, M., Brkić, B. (2012) Tehnike i metode napada na komunikacioni kanal pri prenosu podataka u mobilnoj telefoniji. in: 10. Međunarodni naučni skup 'Sinergija 2012', pp. 89-94
 

About

article language: Serbian
document type: Review Paper
DOI: 10.5937/bezbednost1502076K
published in SCIndeks: 16/01/2016

Related records

Bezbednost, Beograd (2015)
Video surveillance system for automatic recognition of motor vehicle number plates
Nikolić Vojkan, et al.

Nauka bezbednost policija (2011)
A test of IDS application open source and commercial source
Ranđelović Dragan, et al.

Bezbednost, Beograd (2015)
The specificity of tools for responding to an emergency call's in the police
Ranđelović Dragan, et al.

show all [13]