Monday, 10 October 2016

OpenBSD-the most secured operating system

 TECH:- In today's world, securtiy is a bigger concern for the technology and for the digital world. Making and protecting a secure system is big challenge for the computer and IT industry. Having a secure operating system increase the security of the system and network. OpenBSD is the most secured operating system known. The fact that it suffered only two remote attack vulnerabilities in the last decade is a solid evidence of its stringent security and strict auditing policy.
OpenBSD is a free open source operating system based upon the Berkeley Software Distribution (BSD) for UNIX. OpenBSD is all free. The binaries are free. The source is free. All parts of OpenBSD have reasonable copyright terms permitting free redistribution. This includes the ability to reuse most parts of the OpenBSD source tree, either for personal or commercial purposes.
Some reasons why OpenBSD is a useful and most secure operating system:

Features:-
  • It runs on many different hardware platforms.
  • It is thought of by many security professionals as the most secure UNIX-like operating system.
  • It is a full-featured UNIX-like operating system available in open source form.
  • It integrates cutting-edge security technology suitable for building firewalls and private network services in a distributed environment.
  • It benefits from strong ongoing development in many areas, offering opportunities to work with emerging technologies with an international community of programmers and end users.
Security Features:-
  • Memory Protection-it integrates several technologies to help protect the operating system from attacks such as buffer overflows or integer overflows.
  • Cryptography and Randomization-making network connection more secure by using randomization-cryptography technique.
  • Privilege Separation-It is a technique in which a program is divided into parts which are limited to the specific privileges they require in order to perform a specific task
  • Privilege Revocation-It is a measure taken by a program to protect the system against misuse of itself.
  • Chrooting- Chrooting is an operation that changes the apparent root directory for the current running process and their children. A program that runs in such a modified environment cannot access files and commands outside that environmental directory tree.
  • Address Space Layout Randomization (ASLR)-It  randomly arranges the address space positions of key data areas of a process, including the base of the executable and the positions of the stack, heap and libraries, protection from buffer overflow attacks.
 

No comments:

Post a Comment