0% found this document useful (0 votes)
18 views3 pages

It22 Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views3 pages

It22 Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

WHY IS THERE A NEED TO CONTROL THE OPERATING SYSTEM?

1. Security: Controlling the OS allows administrators to enforce security policies, such


as access controls, encryption, and intrusion detection, to protect sensitive data
and prevent unauthorized access.

2. Stability and Reliability: By controlling the OS, administrators can ensure that only
approved software and configurations are installed, reducing the risk of system
crashes, conflicts, and instability.

3. Performance Optimization: Control over the OS enables administrators to optimize


system performance by adjusting settings, allocating resources efficiently, and
prioritizing critical tasks.

Overall, controlling the operating system provides administrators with the tools and
capabilities needed to ensure the security, stability, performance, compliance, and
customization of computer systems to meet the needs of users and organizations.

OBJECTIVES OF AN OPERATING SYSTEM

The objectives of an operating system (OS) can be categorized into several broad areas:

1. Resource Management: The OS efficiently manages hardware resources such as


CPU, memory, storage, and peripherals. It allocates these resources to processes
and applications as needed, ensuring optimal utilization and fairness.

2. Performance Optimization: The OS optimizes system performance by


implementing efficient algorithms and strategies for resource management,
scheduling, caching, and other system operations. It maximizes throughput,
responsiveness, and scalability to meet the performance requirements of
applications and users.

Overall, the objectives of an operating system aim to provide a stable, efficient, secure,
and user-friendly environment for running applications and managing hardware
resources on computer systems.

To perform these tasks consistently and reliably, the operating system must achieve five
fundamental control objectives.

1. Error handling and Fault tolerance: It ensures system reliability and availability of
minimizing the impact of failures through error detection, correction, and, recovery
techniques.

2. Security: The OS implements security mechanisms to protect system resources and


data from unauthorized access, malware, and other security threats. It includes user
authentication, access control, encryption, auditing, and security updates to mitigate
vulnerabilities.

OPERATING SYSTEM SECURITY

Operating system security is a critical aspect of overall system security, as the operating
system serves as the foundation upon which all other software and applications run. By
addressing these aspects of operating system security and implementing appropriate
security measures, organizations can reduce the risk of security breaches, protect
sensitive data, and maintain the integrity and availability of their systems and networks.

LOG-ON PROCEDURE

The message should not reveal whether the password or the ID caused the failure. The
system should allow the user to reenter the log-on information. After a specified number
of attempts (usually no more than five), the system should lock out the user from the
system.

ACCESS TOKEN

An access token is a credential used to authenticate and authorize a user or application


to access protected resources, such as data or services, in a system or network. Access
tokens are commonly used in authentication and authorization protocols to enable
secure access to resources without revealing the user's credentials, such as passwords.

ACCESS CONTROL LIST

ACLs define which users or groups of users are granted access to specific resources and
what actions they are allowed to perform on those resources. ACLs are widely used to
enforce access control policies and protect sensitive resources from unauthorized
access. They provide a flexible and customizable mechanism for managing access rights
based on the security needs of organizations and the sensitivity of the resources being
protected.

DISCRETIONARY ACCESS PRIVILEGES

For example, the controller, who is the owner of the general ledger, may grant read-only
privileges to a manager in the budgeting department. The accounts payable manager,
however, may be granted both read and write permissions to the ledger. Any attempt
the budgeting manager makes to add, delete, or change the general ledger will be
denied. The use of discretionary access control needs to be closely supervised to prevent
security breaches because of its liberal use.

THREATS TO OPERATING SYSTEM INTEGRITY

Accidental threats include hardware failures that cause the operating system to
crash. Errors in user application programs, which the operating system cannot interpret,
also cause operating system failures. Accidental system failures may cause whole
segments of memory to be dumped to disks and printers, resulting in the unintentional
disclosure of confidential information.

Maintaining the integrity of an operating system (OS) is crucial for ensuring its reliability,
security, and proper functioning.

1. Insider Threats: Insider threats, including disgruntled employees, malicious insiders, or


careless users, can pose a significant risk to operating system integrity. Insiders may
intentionally or unintentionally compromise system integrity by abusing their privileges,
circumventing security controls, or disclosing sensitive information.

2. Unauthorized Access: Unauthorized access by malicious users or attackers can


compromise the integrity of an operating system by modifying system configurations,
stealing sensitive data, or installing malicious software. This can occur through various
means, including exploiting weak passwords, bypassing authentication mechanisms, or
exploiting software vulnerabilities.

3. Malware: Malicious software, such as viruses, worms, Trojans, ransomware, and


spyware, poses a significant threat to the integrity of operating systems. Malware can
compromise system integrity by modifying or deleting files, exploiting vulnerabilities, and
gaining unauthorized access to system resources.

You might also like