<aside> 💡

Summary of Section 16.1 – Security Goals and Threats (C191: Operating Systems for Programmers | zyBooks)

</aside>

1. Security Goals and Threats

2. Types of Security Violations

The key types of security violations and their consequences:

Violation Definition Typical Consequences
Information Disclosure Unauthorized release of information (theft or deliberate leakage). Breach of confidentiality/privacy.
Information Modification Unauthorized data/program changes by intruders or legitimate users. Loss of data integrity and potential future violations.
Information Destruction Deliberate or accidental deletion of data or damage to hardware. Loss of data or service access.
Unauthorized Use Circumventing authentication to access services. Financial loss for service providers.
Denial of Service (DoS) Preventing legitimate users from accessing a service. System unavailability, financial loss.
User Deception Manipulating a user into trusting false information. Leads to additional security breaches.

3. Insider Attacks

4. Exploiting Human Weaknesses

5. System Weakness Exploitation

6. Confining Mobile Code