Antivirus Protection & Internet Security Software
Vulnerable Software Infographic
Both operating systems and apps are vulnerable to various exploits by cybercriminals. These vulnerabilities are taken advantage of by cybercriminals to infect devices with malware and other Internet threats. Specifically, these exploits and vulnerabilities can results from either program errors or from intended features.
Of course, it’s possible to design an OS in a way that prevents new or unknown applications from gaining reasonably broad or complete access to files stored on the disk – or getting access to other applications running on the device. In effect, this type of restriction can boost security by blocking all malicious activity. However, this approach will also impose significant restrictions on legitimate applications – and that can be very undesirable.
Here are some examples of closed and partly-closed systems:
Closed systems on mobile phones
The operating systems in many basic mobile phones – as opposed to smartphones and phones that support the use of third-party, Java-based applications – provide an example of widely-used, protected systems. These devices were not generally prone to virus attacks. However, new applications could not be installed – so, the devices were severely limited in their functionality.
The Binary Runtime Environment for Wireless Mobile Platform (BREW MP)
The BREW platform is another example of an environment that is closed for viruses. Mobile phones that run this platform will only allow the installation of certified applications with crypto signatures. Although detailed documentation is published – to help third-party software producers to develop applications – the certified applications are only available from the mobile service providers. Because each application has to be certified, this can slow down software development and delay the commercial release of new applications. As a result, the BREW platform is not as widely used as some other platforms – and some other alternatives offer a much wider selection of applications for users to choose from.
If desktop operating systems, such as Windows or MacOS, were based on the principle of the ‘closed system’, it would be much more difficult – and maybe impossible in some cases – for independent companies to develop the wide range of third-party applications that consumers and businesses have come to rely on. In addition, the range of available web services would also be much smaller.
The Internet – and the world in general – would be a very different place:
To some extent, the risks that system vulnerability and malware bring may be the price we have to pay for living in a world where technology helps us to achieve our work and leisure objectives… more rapidly and more conveniently. However, choosing a rigorous antivirus solution can help to ensure you can enjoy technology’s benefits – in safety.
To discover the other factors that enable malware to thrive and survive, please click the following links:
Other articles and links related to Exploits and Vulnerabilities
© 1997 – 2016 Kaspersky Lab
All Rights Reserved. Industry-leading Antivirus Software