PROTECTION OF OPERATING SYSTEMS AGAINST POSSIBLE THREATS

Authors

  • С. Єгоров National Aviation University

DOI:

https://doi.org/10.18372/2306-1472.49.85

Keywords:

operating systems, protected operation mode of operating systems, recommendations to protection of the operating systems, virtual machines

Abstract

Efficiency of usage of programs which return OS to an initial state after reboot and select the
virtual environment for software start, it has been proved by their usage in Internet cafe and in
educational institutions. The organization of protection of OS from hacker attacks and the harmful
software difficult enough task. It is connected by it is necessary what to resist to experts who have
high qualification and intelligence. Program writers of protection not in a state completely to trace appearance of the new harmful software and hacker attacks. The unique method to resist to all types
of threats which influence OS closed source is a tracing and timely setting of appropriate updates
for OS, and also timely update of anti-virus bases. If to adhere to all recommendations which are
stated in this article it is possible to lower considerably probability of loss of the information from
influence of various threats on OS

References

Kaspersky Internet Security 6.0. [электрон-

ный ресурс]: © ЗАО «Лаборатория Касперско-

го» – Электорон. дан. (1 файл). – М., 2007. –

с. – Режим доступу: http://docs.kasperskylabs.

com/russian/kav6.0ru.pdf. – Назва з екрана.

Microsoft® Windows 2000 Server. Рус-

ская версия / А.Г. Андреев, Е.Ю. Беззубов,

М.М. Емельянов и др. – СПб.:

БХВ-Петербург, 2003. – 960 с.

Introduction to Comodo Internet Security

[Electronic resource]: © Comodo Group, Inc. –

Mode of access: WWW.URL:

http://help.comodo.com/ topic-72-1-155-1074-

Introduction-to-Comodo-Internet-Security.html. –

Title from the screen.

Published

05-04-2012

How to Cite

Єгоров, С. (2012). PROTECTION OF OPERATING SYSTEMS AGAINST POSSIBLE THREATS. Proceedings of National Aviation University, 49(4), 80–82. https://doi.org/10.18372/2306-1472.49.85

Issue

Section

INFORMATION TECHNOLOGY