It22 Report
It22 Report
2. Stability and Reliability: By controlling the OS, administrators can ensure that only
approved software and configurations are installed, reducing the risk of system
crashes, conflicts, and instability.
Overall, controlling the operating system provides administrators with the tools and
capabilities needed to ensure the security, stability, performance, compliance, and
customization of computer systems to meet the needs of users and organizations.
The objectives of an operating system (OS) can be categorized into several broad areas:
Overall, the objectives of an operating system aim to provide a stable, efficient, secure,
and user-friendly environment for running applications and managing hardware
resources on computer systems.
To perform these tasks consistently and reliably, the operating system must achieve five
fundamental control objectives.
1. Error handling and Fault tolerance: It ensures system reliability and availability of
minimizing the impact of failures through error detection, correction, and, recovery
techniques.
Operating system security is a critical aspect of overall system security, as the operating
system serves as the foundation upon which all other software and applications run. By
addressing these aspects of operating system security and implementing appropriate
security measures, organizations can reduce the risk of security breaches, protect
sensitive data, and maintain the integrity and availability of their systems and networks.
LOG-ON PROCEDURE
The message should not reveal whether the password or the ID caused the failure. The
system should allow the user to reenter the log-on information. After a specified number
of attempts (usually no more than five), the system should lock out the user from the
system.
ACCESS TOKEN
ACLs define which users or groups of users are granted access to specific resources and
what actions they are allowed to perform on those resources. ACLs are widely used to
enforce access control policies and protect sensitive resources from unauthorized
access. They provide a flexible and customizable mechanism for managing access rights
based on the security needs of organizations and the sensitivity of the resources being
protected.
For example, the controller, who is the owner of the general ledger, may grant read-only
privileges to a manager in the budgeting department. The accounts payable manager,
however, may be granted both read and write permissions to the ledger. Any attempt
the budgeting manager makes to add, delete, or change the general ledger will be
denied. The use of discretionary access control needs to be closely supervised to prevent
security breaches because of its liberal use.
Accidental threats include hardware failures that cause the operating system to
crash. Errors in user application programs, which the operating system cannot interpret,
also cause operating system failures. Accidental system failures may cause whole
segments of memory to be dumped to disks and printers, resulting in the unintentional
disclosure of confidential information.
Maintaining the integrity of an operating system (OS) is crucial for ensuring its reliability,
security, and proper functioning.