Even the security performance of Chrome OS

Source: Internet
Author: User

Google promised that users of the new Chrome OS would "not worry about viruses, malware, or install security updates ." Of course, it is too early to fully evaluate the security of Chrome OS. It will take at least a year for the operating system to be officially released. Although Google has released the source code for this operating system, you need to compile the source code before running Chrome OS. however, in any case, at least this compiled version can be used to gain a glimpse of the role of the leopard. We may take this opportunity to look at the security situation of Google's so-called brand-new operating system.

498) this. style. width = 498; "border = 0>

In fact, there are many reports and introductions about Chrome OS. Google once published an article on the future development plan of the Chrome OS Operating System security technology. Of course, these plans may not be fully implemented, but in the current version alone, the security features are exciting.

498) this. style. width = 498; "border = 0>

Chrome OS updated at any time:

All system-level code of Chrome OS is stored in one partition, and user-level data must be stored in another partition. The two types of data cannot coexist in the same partition. From this perspective, Microsoft's design philosophy is somewhat similar. In Windows, application programs and Windows system configuration files are also stored in two different directories in the same partition, of course, this method of separate storage is not as thorough as Chrome OS.

498) this. style. width = 498; "border = 0>

In Chrome OS, the automatic update function is not as adjustable as in Windows. In Windows, users can easily disable the automatic update function, however, Chrome OS forces the system to update automatically, and users cannot disable this function on their own. In my opinion, Microsoft should adopt a method that only senior users can find to disable automatic update settings, while Microsoft apparently did not.

According to Google Will Drewry's sectionVideoDisplay: When the Chrome OS downloads the upgrade file, the file will be installed in an inactive partition. After the download is complete, the system will check the upgrade file again before updating, in this way, even if the upgrade is interrupted halfway, only half of the upgrade will not occur.

When Chrome OS is started, it verifies the system file:

Every time the system restarts, Chrome OS checks the digital signature of the system files to ensure that these files have not been modified. If the system file changes abnormally, the system will immediately use the Upgrade Program to restore the files to their original state. In this way, only one restart is required, then the threat of malware can be completely eliminated. So, isn't the virus able to achieve its own goal by changing the review process? According to the system file verification steps displayed by Will Drewry's video, it seems difficult for the virus to change this review program.

498) this. style. width = 498; "border = 0>

This security policy is not used for the first time after a virus is detected and is reset back to the original state. Microsoft once provided a software named Window SteadyState, which can restore system files to their original state every time the system is restarted. Third-party software vendors have also developed many similar software for Windows. However, because Windows does not adopt the design to separate system files from user files, the user files will be restored to the initial state after each restoration, chrome OS does not have this problem.

Operating systems without malware?

Theoretically, there is indeed no malware problem in Chrome OS, because all applications of this operating system are based onNetworkAccording to the Demo Video of Drewry, each Web application runs in a completely independent environment, so it is difficult for the two applications to affect each other. Of course, if the malicious software writer uses cross-site scripting technology, it is also possible to achieve this goal, but no reports or articles about this have been published yet.

498) this. style. width = 498; "border = 0>

To prevent malware attacks, Microsoft has set the UAC User Account Control Function in Vista, which can limit the harm caused by malware. However, this function has caused users' unhappiness, in Windows 7, Microsoft adjusted the UAC settings, and the UAC Control Panel will not pop up too frequently. However, because UAC does not know whether a software runs properly, you can still see the UAC pop-up frequently.

In this regard, the design of Chrome OS is much better than that of Chrome OS. Because it is not installed in a local desktop application, only system-level processes run locally, so that the operating system can have a thorough understanding of the system resources required for running these processes, even if malware attacks these processes, these software can only use the relevant system resources within the originally defined limits.

In Chrome OS, browser plug-ins are the most similar to traditional desktop applications. According to Google, each plug-in runs in an independent process. These plug-ins do not interfere with or intervene in other plug-ins, or the code and data of browsers. This Sandbox design greatly limits the damage level of malicious plug-ins. Therefore, Chrome OS can theoretically be protected from malware attacks.

Chrome OS user data security protection measures:

Chrome OS does not have the concept of local files. All files are saved online. Therefore, even if your system is attacked, user files can still be kept secure. If other people want your data stored on the Internet, they also need to crack Google's encryption system. This cloud computing-based encryption system does not require the involvement of Chrome OS. Of course, you can also adopt a similar security policy in Windows, but this policy has been adopted by default in Chrome OS.

Of course, if an error occurs during operations on the user end, security issues may also occur. Obviously, Chrome OS adds the option to allow users to set Automatic Logon. If a user loses a computer set to automatic logon, then the person who gets the computer can get all the user data. However, since the START process of Chrome OS is very short than that of Windows, it takes only a few seconds to enter the user name and password.

498) this. style. width = 498; "border = 0>


 

How does Chrome OS handle devices?DriverQuestion?

Chrome OS focuses on Internet applications. However, currently, how does this operating system handle iPod,Printer,Digital CameraAnd so on, the peripherals are still unclear. The DownloadSquad blog site once claimed that there was a code in the Chrome OS browser code that could track and record the usage of mobile devices, therefore, they guessed that Chrome OS's browser may implement functions similar to Windows Expoler File Manager program.

If the browser does include the File Manager function, it may bring security risks to the system. If the browser does not include this function, how can Chrome OSStorageWhat if the content is synchronized to the PC? It seems that this problem has no solution for the moment.

Security Expert's point of view:

I have consulted many security experts on the security design of Chrome OS. However, since the operating system has just appeared, only a few experts have restored it. One expert pointed out that Bruce Schneier, another security expert, said Chrome OS was completely immune to viruses ".

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.