Computer Operating System Security Its Design And Different Aspect Of It

1160 Words5 Pages
INTRODUCTION
An era of technology has begun and we are living in with various technology around us and are using it in different aspect. With the technology we have its system on it which allocates and manages various resources like processors, memory, input/output and information on secondary devices. Here, in this essay we are going to find the important of computer operating system security its design and different aspect of it. A computer is basically a lump of metal. With its software, a computer can store, process and retrieve information, find spelling errors in manuscripts, play games and engage in many valuable activities. Computer software can be roughly divided into two kinds: the system programs, which manage the operation of
…show more content…
• Memory management: It means allocation of main memory and secondary storage areas to the system programs, as well as user programs and data.
• Input and Output management: It means co-ordination and assignment of the different out and input devices while one or more programs are being executed.
• File system management: Operating system is also responsible for maintenance of a file system, which the users are allowed to create, delete and move files.

COMPONENTS:
The components of an operating system all exist in order to make the different parts of a computer work together. All user software needs to go through the operating system in order to use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an Internet component. They are:-
KERNEL:The kernel provides the most basic level of control over all of the computer 's hardware devices. It manages memory access for programs in the RAM
NETWORKING:Operating systems can participate in a common network for sharing resources such as computing, files, printers, and scanners using either wired or wireless connections.
SECURITY: OS should be capable of distinguishing between requests which should be allowed to be processed, and others which should not be processed
USER INTERFACE:Every computer that is to be
Get Access