Friday, March 6, 2020

Windows XP Essay Example

Windows XP Essay Example Windows XP Essay Windows XP Essay Computer security and protection has become a prime necessity of today’s era and Windows XP has proved itself as a quite efficient software or operating system. This OS works on different derivatives that determine protection. First it determines the Goals of Protection and follows it with Principles of Protection and Domain of Protection. Then the access matrix is formed and the Access Matrix is implemented with the help of access control and then it is determined by the aspects of Access Rights Revocation. However, in general it can be stated that Computer security and protection of Windows XP is mainly based on two aspects. The first is Capability-Based Systems and the second one is Language-Based Protection.In general it can be stated that there are several areas of threats for a computer system and these includes Breach of confidentiality, Breach of integrity, Breach of availability, Theft of service and Denial of service. All these means are instrumented by the help of c ertain methods like Session hijacking, Man-in-the-middle attack and breach authentication or Masquerading. But the good news is that Windows XP has been successful in negotiating these problems so far. The main reason behind this success is the four level operation of security in Windows XP. These four levels are the Network structure, Operating System configuration, physical protective measures and being more user friendly by making the human elements involved more aware and informed. However, it should be remembered that weakness in any of the four aspects may cause the failure of the entire security and protection measures. Thus it is important to update and keep informed at all levels. (Lamb, 2004)The most common and menacing threats of the Computer security and protection of Windows XP are Trojan horse or Trojans. These are extremely threatening and they operate on misused environment in Code segment and exploited mechanism that allow programs written by users to be executed by other users. They also operate as covert channels, pop-up browser windows and spyware. There is another security related threat and it is called Trap Door and these could be included in a compiler and threats specific user identifier or password that circumvents normal security procedures. Furthermore, there is another computer treat called the Logic Bomb and it is a Program that initiates a security incident under certain circumstances. Computer security and protection of Windows XP negates and identifies these threats and protects the computer successfully.This application of security and protection are varied and meticulous in Windows XP. As defense in depth is most common security theory the OS uses multiple layers of security. Windows XP also has a Security policy that describes what is being secured making the system more informative and particular. The Windows XP also uses vulnerability assessment compares real state of system / network compared to security policy and there is also intrusion detection endeavors to detect attempted or successful intrusions. It also uses a Signature-based detection spots that enables the knowledge of bad patterns and also uses Anomaly detection methods that spots differences from normal behavior. Along with all these specifications the Windows XP also provides Virus protection and the entire procedure is supported by Auditing, accounting, and logging of all or specific system or network activities. (King, 2006)References:King, H; (2006); OS Today: Windows XP; Auckland: HBT Brooks LtdLamb, D; (2004); Cult to Culture: The Development of Civilization on the Strategic Strata; Wellington: National Book Trust