ABSTRACT

The aim of this work is to find out the answers for three questions “How a single process, run on operating system, can violate an operating system security?”, “How the single process influence on operating system performance?”, “How to measure the extent of damages resulting from such action?”.