{"title":"Operating System Security and Host Vulnerability Evaluation","authors":"Jihong Song, Guiying Hu, Quansheng Xu","doi":"10.1109/ICMSS.2009.5302077","DOIUrl":null,"url":null,"abstract":"In today’s information society, the information security is more and more regarded. It is mainly divided into five parts: physical security, network security, host security, application security and data security. Among them, the host security is in the first floor of the whole information system. However, the host security depended on operating system (OS) security necessarily. It is obvious that the OS security is the essential precondition and foundation of the whole computer information system security. In this article, firstly, it discussed the importance of the OS security; secondly, it further introduced the OS security mechanism, security demand, security policy and security model; finally, it discussed the host vulnerability evaluation, and put forward the function that a testing all-around host evaluation tool ought to carry out. Keywords-host security; OS security; host vulnerability evaluation","PeriodicalId":267621,"journal":{"name":"2009 International Conference on Management and Service Science","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Management and Service Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMSS.2009.5302077","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
In today’s information society, the information security is more and more regarded. It is mainly divided into five parts: physical security, network security, host security, application security and data security. Among them, the host security is in the first floor of the whole information system. However, the host security depended on operating system (OS) security necessarily. It is obvious that the OS security is the essential precondition and foundation of the whole computer information system security. In this article, firstly, it discussed the importance of the OS security; secondly, it further introduced the OS security mechanism, security demand, security policy and security model; finally, it discussed the host vulnerability evaluation, and put forward the function that a testing all-around host evaluation tool ought to carry out. Keywords-host security; OS security; host vulnerability evaluation