INTRODUCTION
An era of technology has begun and we are living in with various technology around us and are using it in different aspect. With the technology we have its system on it which allocates and manages various resources like processors, memory, input/output and information on secondary devices. Here, in this essay we are going to find the important of computer operating system security its design and different aspect of it. A computer is basically a lump of metal. With its software, a computer can store, process and retrieve information, find spelling errors in manuscripts, play games and engage in many valuable activities. Computer software can be roughly divided into two kinds: the system programs, which manage the operation of
…show more content…
• Memory management: It means allocation of main memory and secondary storage areas to the system programs, as well as user programs and data.
• Input and Output management: It means co-ordination and assignment of the different out and input devices while one or more programs are being executed.
• File system management: Operating system is also responsible for maintenance of a file system, which the users are allowed to create, delete and move files.
COMPONENTS:
The components of an operating system all exist in order to make the different parts of a computer work together. All user software needs to go through the operating system in order to use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an Internet component. They are:-
KERNEL:The kernel provides the most basic level of control over all of the computer 's hardware devices. It manages memory access for programs in the RAM
NETWORKING:Operating systems can participate in a common network for sharing resources such as computing, files, printers, and scanners using either wired or wireless connections.
SECURITY: OS should be capable of distinguishing between requests which should be allowed to be processed, and others which should not be processed
USER INTERFACE:Every computer that is to be
1)A network is when two or more computers are connected together and are able to share data and communication.
The article, which addresses security loopholes in modern computing environments, by Loscocco et al highlights what is and has been being done security wise in the past and how secure these implementations were and going forward what should be done to ensure in depth security which guarantees system wide security (1998). The article first explains features of secure operating system and why current systems implemented under the notion of application space security ultimately failed to safe guard the integrity and confidentiality of our assets. The article then continued with general examples of access control and cryptography implemented in the application space with no or little support from operating system and showed their vulnerabilities to attacks such as tampering, bypassing and spoofing. The article supplied real-life examples to support the evidence that building security in the application space without secure operating system is meaningless. The article raised concrete examples on mobile code security, Kerberos network authentication service, IPSEC and SSL network security protocols and firewall. The paper finally put an interesting remark that security implemented in application space without secure operating system is like “building a house in a pile of sand” and it also emphasized that secure operating system without better security on the
Operating systems have the responsibility to ensure that users do not access the system illegally. They also perform different tasks such as managing system resources, communicate between software and hardware, monitoring performance and operate utilities and applications.
Connectivity on operating systems can vary to what the user wants the system to connect to. This means that the user is able to connect the system to any device which they may require. If the user wanted to connect a printer to the Pc or Mac then they user can do that. Many devices are able to connect to the computer via a Wireless and bluetooth connection, this would save space and save the user using cables around the computer system.
The Operating system is one most important parts of anything that runs on technology. It manages the computers memory and processes the information for the software and hardware. There is different operation system for pc, tablets, smart cars, and smartphones.
System software:The programs that control and manage the basic operations of a computer are generally referred to as system software. System software typically includes the following types of programs: operating systems, utility programs, software development
A computers operating system (OS) is the core of the computer and is more than just software. The OS controls the computer’s memory and processes as well as its hardware and software. It is the brain of the computer. Software applications on the other hand perform a certain task. Ex. Google Chrome provides internet and Adobe allows PDF files to be read (among other things). The OS is what makes all of these applications work successfully and accomplish whatever the application is designed to accomplish.
b) 1) Take the commands one by one from the main memory and execute the necessary commands and commands.
What is Operating System Security, Operating system security is the process of ensuring OS integrity, confidentiality and availability also OS security refers to specified steps used to protect the OS from threats, viruses, worms, malware or remote hacker. OS security include all avoiding-control techniques, which safeguard any computer information from being stolen, edited or deleted if OS security is included. OS security allows different applications and programs to perform required tasks and stop unauthorized interference. OS security may be applied in many ways. We 're going to discuss following topics in this article. A brief description about security and what are the types of encryption and what is Authentication, One Time passwords, Program Threats, System Threats and Computer Security Classifications.
Operating System is a main computer program that communicates with the hardware to help the computer run.
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. (Operating Systems) Without the operating system, a computer could not function. Applications would not be able to operate
Process management creates processes, and implements multitasking by switching the active process on the processor.
Security is not only an issue with the operating systems in desktops and laptops; the
Process Management: Processes are applications running in state. The operating system ensures that each process is fairly treated in terms of processor time allocated in an environment which is multitasking. The operating system has the capability of doing multiple processes. The allocation of Central Processing Unit (CPU) is normally being affected because some operating system always allows processes to be assigned apriority. Operating systems that are more interactive sometimes employ feedback in which tasks that the user is working upon receives a higher priority. In most cases, there is background process that runs when there is no other process waiting for CPU (Stroman, Wilson, & Wauson, 2004).
Network operating system works on a server and it allows the server to manage other functions on a computer. The main purpose of a