INTRODUCTION
An era of technology has begun and we are living in with various technology around us and are using it in different aspect. With the technology we have its system on it which allocates and manages various resources like processors, memory, input/output and information on secondary devices. Here, in this essay we are going to find the important of computer operating system security its design and different aspect of it. A computer is basically a lump of metal. With its software, a computer can store, process and retrieve information, find spelling errors in manuscripts, play games and engage in many valuable activities. Computer software can be roughly divided into two kinds: the system programs, which manage the operation of
…show more content…
• Memory management: It means allocation of main memory and secondary storage areas to the system programs, as well as user programs and data.
• Input and Output management: It means co-ordination and assignment of the different out and input devices while one or more programs are being executed.
• File system management: Operating system is also responsible for maintenance of a file system, which the users are allowed to create, delete and move files.
COMPONENTS:
The components of an operating system all exist in order to make the different parts of a computer work together. All user software needs to go through the operating system in order to use any of the hardware, whether it be as simple as a mouse or keyboard or as complex as an Internet component. They are:-
KERNEL:The kernel provides the most basic level of control over all of the computer 's hardware devices. It manages memory access for programs in the RAM
NETWORKING:Operating systems can participate in a common network for sharing resources such as computing, files, printers, and scanners using either wired or wireless connections.
SECURITY: OS should be capable of distinguishing between requests which should be allowed to be processed, and others which should not be processed
USER INTERFACE:Every computer that is to be
The Operating System manages the flow of data and tells the processor what component needs to be doing. It does this my relaying one piece of information at a time but done so fast it seems it is doing it all at the same time. It does this by giving the information to the processer in computer language, so it can understand.
Connectivity on operating systems can vary to what the user wants the system to connect to. This means that the user is able to connect the system to any device which they may require. If the user wanted to connect a printer to the Pc or Mac then they user can do that. Many devices are able to connect to the computer via a Wireless and bluetooth connection, this would save space and save the user using cables around the computer system.
Operating systems have the responsibility to ensure that users do not access the system illegally. They also perform different tasks such as managing system resources, communicate between software and hardware, monitoring performance and operate utilities and applications.
The article, which addresses security loopholes in modern computing environments, by Loscocco et al highlights what is and has been being done security wise in the past and how secure these implementations were and going forward what should be done to ensure in depth security which guarantees system wide security (1998). The article first explains features of secure operating system and why current systems implemented under the notion of application space security ultimately failed to safe guard the integrity and confidentiality of our assets. The article then continued with general examples of access control and cryptography implemented in the application space with no or little support from operating system and showed their vulnerabilities to attacks such as tampering, bypassing and spoofing. The article supplied real-life examples to support the evidence that building security in the application space without secure operating system is meaningless. The article raised concrete examples on mobile code security, Kerberos network authentication service, IPSEC and SSL network security protocols and firewall. The paper finally put an interesting remark that security implemented in application space without secure operating system is like “building a house in a pile of sand” and it also emphasized that secure operating system without better security on the
System software:The programs that control and manage the basic operations of a computer are generally referred to as system software. System software typically includes the following types of programs: operating systems, utility programs, software development
Operating System is a main computer program that communicates with the hardware to help the computer run.
ANSWER: Operating system exist on the grounds that they offer a sensible approach to tackle the issue of making a usable processing framework. The major objective of computer systems is to execute user programs and to make user issues simpler. Computer hardware is developed to this objective. Since exposed hardware alone is not simple to utilize, application programs are produced. These programs require basic operations, for example, those controlling the I/O devices. The regular capacities of controlling and assigning assets are then brought together into one bit of software: the operating system. Another way we
In this paper I will discuss the comparison of memory from each one of these, UNIX®, Linux®, Mac®, and Microsoft® Windows® operating systems. Each one is different from one to another. They can either be an open source operating system or closed operating system. Reading this paper, will shed some light on things people do not even understand what the operating system and memory management does.
b) 1) Take the commands one by one from the main memory and execute the necessary commands and commands.
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. (Operating Systems) Without the operating system, a computer could not function. Applications would not be able to operate
Process management creates processes, and implements multitasking by switching the active process on the processor.
This paper will elaborate on the major differences of the main Operating Systems (OS), which are UNIX/Linux, Mac®, Microsoft® Windows®. The areas of discussion for this paper will be on Memory Management, Process Management, File Management, and Security for each operating system. Operating Systems (OS) for a computer is the main processing software program used to allow the computer processor to communicate with the software and hardware I/O devices. Computers as SUN, SUSE use UNIX/Linux operating system, Mac® (Macintosh) computer uses Apple operating system, and Personal Computers (PC)
functionality of the operating system. Or in other words, the file system can be kept out
Network operating system works on a server and it allows the server to manage other functions on a computer. The main purpose of a
Operating system is a platform that is found between the hardware and the user that is responsible for management and sharing of resources of the computers. Operating system has a basic function definition; it is a program making the power of the computer to be available to users by use of hardware control. Computers cannot work if there is no operating system installed in them since it hosts many applications running inside the computer while handling operations of the computer hardware. Operating systems are of many different types having various functions. This paper therefore, tends to analyze the functions of operating system.