Question

what do you believe to be the potential security issues with system services? This includes all...

what do you believe to be the potential security issues with system services? This includes all programs or applications that run in the background without a user even being aware that they are running. This may include both desktops or servers since all servers have background processes running to offer up the services (Web server, file sharing server, e-mail server, etc all make use of system services to offer up their functionality to users).
0 0
Add a comment Improve this question Transcribed image text
Answer #1

There are many security issues related to the system services and these may even lead to the overall destruction of the system also. Some of them are : privilege rights modification or privilege escalation, this can be done by exploiting the bugs in the system and modifying the rights in the system. Viruses, worms and trojan horses are another major threat and thay can lead to deletion, modification, or corruption of the files or the system services, some times they are undetectable. They also lead to loss of information and it's transfer to the outside world.

Spyware, spam, adware, rootkists, logic bombs are also some of the threats to the systems.

Add a comment
Know the answer?
Add Answer to:
what do you believe to be the potential security issues with system services? This includes all...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • 1). The _____ supports only those services that are necessary to allow other system services (executed...

    1). The _____ supports only those services that are necessary to allow other system services (executed in user space) to run. a. max-kernel b. micro-kernel c. mini-kernel d. macro-kernel 2). _____ means having multiple programs (processes) running on one processor, whereas multiprocessing means having multiple processors. _____ typically refers to multiple processes from multiple users, whereas multithreading generally refers to multiple threads from one user process. a. Multi-GUI b. Multi-programming c. Multi-flow d. Multi-CPU 3). _____ saves disk space, results...

  • You work for EGS Testing Solutions; your company is involved in testing related to access control...

    You work for EGS Testing Solutions; your company is involved in testing related to access control systems. A large, private fitness club contacted your company because their Web server was hacked. The fitness club has a corporate office with 50 workstations, 4 application servers, 2 e-mail servers, 2 Web servers, and 129 franchisees with 10 workstations and about 3,500 members at each location. Except for the equipment at the franchisees’ locations, all other equipment resides at the central headquarters. The...

  • Computer security and system management

    Step-By-Step Assignment Instructions less  Assignment Narrative:  Suppose that you were just hired by a medium size company.  You are replacing a previous system admin that really didn't understand what they were doing.  Your supervisor would like you to suggest ways of building and protecting their Linux server environment based off of your interview (based off of what you learned in this course).    They are proposing the following for a new business venture and would like you to help.  The criteria...

  • 166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls...

    166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...

  • Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as...

    Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as files and hardware. 2. A(n). is a logical grouping of users and equipment as defined by the network administrator. 3. Microsoft server editions have interfaces similar to the current was new for Windows Server 2008 and Windows 7 and is designed to improve network performance by storing information downloaded from the Internet or a web server onto a local area network client. 5. An...

  • Imagine that you are an IT administrator with a medium sized manufacturing company. Your company has...

    Imagine that you are an IT administrator with a medium sized manufacturing company. Your company has the following equipment: 5 Servers in San Francisco, LA and Sacramento, all deploying Windows Server 2102R2 as follows: 1 SQL Server Database server in SFO 1 Exchange Email Server in SFO 1 File Server in SFO. This server is also the Domain Controller 1 File Server in Sacramento 1 File Server in L.A The file servers are connected through VPN lines to each other....

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • CASE 14: BREACHING THE SECURITY OF AN INTERNET PATIENT PORTAL Major theme: IT security Background Information...

    CASE 14: BREACHING THE SECURITY OF AN INTERNET PATIENT PORTAL Major theme: IT security Background Information Kaiser Permanente is an integrated health delivery system that serves over eight million members in nine states and the District of Columbia. 1 In the late 1990s, Kaiser Permanente introduced an Internet patient portal, Kaiser Permanente Online (also known as KP Online). Members can use KP Online to request appointments, request prescription refills, obtain health care service information, seek clinical advice, and participate in...

  • A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine...

    A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine the type of scan that was executed and if a false positive occurred for each device. Instructions: Select the Results Generated drop-down option to determine if the results were generated from a credentialed scan, non-credentialed scan, or a compliance scan. For ONLY the credentialed and non-credentialed scans, evaluate the results for false positives and check the findings that display false positives. NOTE: If you...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT