- citations in SCIndeks: 0
- citations in CrossRef:0
- citations in Google Scholar:[
]
- visits in previous 30 days:17
- full-text downloads in 30 days:9
|
|
2015, vol. 57, iss. 2, pp. 76-91
|
The vulnerability of operating systems to malicious programs
Ranjivost operativnih sistema na zlonamerne programe
Ključne reči: operativni sistem; ranjivost; maliciozni softver; boot sektor virusi
Abstract
Although there are many things that need protection, the main ones are those that appear on the Internet. Many harmful programs instal themselves surreptitiously on the user’s computer and their infiltration cannot be influenced without proper protection. When this happens, it is usually too late and a thorough inspection of the whole computer is needed. Many viruses and hackers on many mobile devices are becoming an increasing problem in today’s protection of personal information. Viruses for mobile phones have been known for a long time, yet the majority of users of these devices infected with malware are not aware of the infection because they do not know for the existence of security vulnerabilities of their operating systems. This paper presents an overview of the corresponding operating systems that support encryption in relation to the selected mobile phone, which can lead to a greater level of security of the device. There are many different types of harmful software that affect the security of mobile devices as well as personal computer systems of users, such as viruses, Trojans, malware, bootkits and others. Master boot sector, the first sector of the hard disk in a computer system which contains the code needed to run the operating system is often the target of specific types of viruses called bootkits or rootkits. Since they are invisible to the operating system it is very difficult to remove them from an infected computer. Therefore the review of the existence of vulnerabilities in operating systems offered in this paper is an attempt at drawing attention to their possible attacks.
Sažetak
Iako postoji veliki broj stvari od kojih je potrebna zaštita, glavne su one koje se pojavljuju sa Interneta. Mnogo štetnih programa se instalira neprimetno na računar korisnika i na njihovu instalaciju bez odgovarajuće zaštite ne može da se utiče. Kad se to dogodi, obično je kasno i potrebna je detaljna provera celog računara. Mnogi virusi i brojni hakeri na mobilnim uređajima postaju danas sve veći problem u zaštiti ličnih informacija. Virusi za mobilne telefone odavno nisu novost, većina korisnika ovih uređaja zaraženih malverom ne zna za infekciju zato što ne znaju za bezbednosne propuste njihovih operativnih sistema. U ovom radu prikazan je pregled odgovarajućih operativnih sistema koji podržavaju šifrovanje u odnosu na izabrani mobilni telefon, što može dovesti do većeg nivo bezbednosti samog uređaja. Postoji mnogo različitih vrsta štetnih softvera koji utiču na bezbednost mobilnih uređaja ali i na personalne (lične) računarske sisteme korisnika, kao što su: virusi, trojanci, malveri, bootkit-oeu i drugi. Master boot sektor, prvi sektor hard diska u računarskom sistemu na kome se nalazi kod potreban za pokretanje operativnog sistema, često je meta napada specifične vrste virusa, tzv. bootkit-oea ili rootkit-oea. Pošto su nevidljivi za operativni sistem, veoma ih je teško ukloniti sa zaraženog računara, pa se u radu, kroz pregled ranjivosti operativnih sistema, skreće pažnja na njihov mogući napad.
|
|
|
References
|
1
|
Čisar, P. (2013) System for detection intrusions into information infrastructure. Nauka, bezbednost, policija, vol. 18, br. 1, str. 113-128
|
2
|
Đikanović, P., Mojsilović, Ž. (2010) Primena SMART kartica kao identifikacionih dokumenata. Bezbednost, Beograd, vol. 52, br. 3, str. 139-157
|
|
Florio, E., Kasslin, K. (2008) Your computer is now stoned (... again!). Virus Bulletin
|
|
Giuliani, M. (2011) Removing Popureb Doesn ‘t Require a Windows Reinstall, weblog: Webroot. http://www.webroot.com/blog/2011/06/30/removing-popureb-doesnt-require-a-windows-reinstall
|
|
Krutz, R.L., Vines, R.D., Stroz, E.M. (2001) The CISSP Prep Guide: Mastering the Ten Domains of Computer Security. Chichester: John Wiley & Sons
|
|
Muthumanickam, K., Ilavarasan, E. (2014) Demanding Requirement of Security for Wireless Mobile Devices: A Survey. Research Journal of Applied Sciences, Engineering and Technology, 8(24): pp. 2381-2387
|
|
One, A. (1996) Smashing the Stack for Fun and Profit. Phrack, Vol. 7, Iss. 49
|
5
|
Pleskonjić, D., Maček, N., Đorđević, B., Carić, M. (2007) Sigurnost računarskih sistema i mreža. Beograd: Mikro knjiga
|
2
|
Ranđelović, D., Stojković, D. (2012) Possibilities of autopsy tool use for forensic purposes. Nauka, bezbednost, policija, vol. 17, br. 3, str. 19-33
|
6
|
Ranđelović, D., Delija, D., Popović, B. (2009) EnCase forenzički alat. Bezbednost, Beograd, vol. 51, br. 1-2, str. 286-312
|
|
Scarfone, K., Mell, P. (2009) The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities (DRAFT), NIST Interagency Report 7502 (Second Public Draft), Computer Security Division Information Technology Laboratory. Gaithersburg, MD: National Institute of Standards and Technology, 20899-8930
|
2
|
Shinder, D.L. (2002) Scene of the cybercrime: Computer forensics handbook. Rockland: Syngress Publishing
|
|
Sikorski, M., Honig, A. (2012) Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. San Francisco, CA
|
|
Silberschatz, A., Galvin, P.B., Gagne, G. (2004) Operating Systems Concepts. John Wiley & Sons, 7th Edn
|
|
Sinchak, S. (2004) Hacking Windows XP. Indianapolis: Wiley Publishing, Inc. Indiana
|
|
Smith, W.R. (2000) The Multi-Boot Configuration Handbook. Indianapolis: Que Publishing, Indiana, pp. 260-261
|
|
Szor, P. (2005) The Art of Computer Virus Research and Defense. Addison Wesley, Pearson Education, Symantec Press
|
|
Tanenbaum, S.A. (2012) Modern Operating System. USA: Prentice Hall, Learning Private Limited, 3rd Edn
|
|
Veinović, M., Ćajić, M., Brkić, B. (2012) Tehnike i metode napada na komunikacioni kanal pri prenosu podataka u mobilnoj telefoniji. in: 10. Međunarodni naučni skup 'Sinergija 2012', pp. 89-94
|
|
|
|