0% found this document useful (0 votes)
4 views

chapter3 focs

An Operating System (OS) is essential software that manages hardware and software resources, providing services like process and memory management, security, and user interfaces. User Account Management ensures authorized access through authentication and permissions, while security features like encryption and firewalls protect against threats. Software updates and antivirus solutions are critical for maintaining security, preventing vulnerabilities, and ensuring system integrity.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

chapter3 focs

An Operating System (OS) is essential software that manages hardware and software resources, providing services like process and memory management, security, and user interfaces. User Account Management ensures authorized access through authentication and permissions, while security features like encryption and firewalls protect against threats. Software updates and antivirus solutions are critical for maintaining security, preventing vulnerabilities, and ensuring system integrity.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Q1.What is an operating system?

An Operating System (OS) is a system software that manages computer hardware and
software resources and provides essential services for computer programs. It acts as a bridge
between the user and the hardware, ensuring efficient operation and resource management.
Functions of an Operating System:
1. Process Management – Handles the execution of programs, multitasking, and
resource allocation.
2. Memory Management – Manages system memory allocation and deallocation.
3. File System Management – Organizes, stores, and retrieves data efficiently.
4. Device Management – Controls hardware components like printers, keyboards, and
storage devices.
5. Security & Access Control – Ensures data protection through authentication and
authorization.
6. User Interface – Provides GUI (Graphical User Interface) or CLI (Command Line
Interface) for user interaction.
7. Networking – Manages internet and local network connections.
8. Error Handling – Detects and handles system errors for stability.

Q2 Define user account management in the context of OS


security.
User Account Management in the context of Operating System (OS) security refers to the
processes and mechanisms used to create, manage, and control user access to a computer
system. It ensures that only authorized users can access system resources while enforcing
security policies.
Key Aspects of User Account Management:
1. User Authentication – Verifies the identity of users through passwords, biometrics, or
multi-factor authentication (MFA).
2. Authorization & Permissions – Assigns specific access rights and privileges to users
based on roles and security policies.
3. User Roles & Groups – Organizes users into groups (e.g., administrators, standard
users) to simplify permission management.
4. Account Creation & Deletion – Manages the addition and removal of user accounts to
maintain system security.
5. Account Locking & Expiration – Implements security measures such as account
lockouts after multiple failed login attempts or automatic expiration for inactive
accounts.
6. Access Control Policies – Enforces rules such as least privilege access to minimize
security risks.
7. Logging & Monitoring – Tracks user activity to detect unauthorized access or security
breaches

Q3 List three key security features in operating systems.


Here are three key security features in operating systems:
1. User Authentication and Access Control – Ensures that only authorized
users can access the system through passwords, multi-factor
authentication (MFA), and role-based access controls (RBAC).
2. Encryption and Data Protection – Protects sensitive data by encrypting
files, storage drives, and network communications to prevent
unauthorized access or interception.
3. Firewall and Network Security – Monitors and controls incoming and
outgoing network traffic, blocking unauthorized access and preventing
cyber threats such as malware and hacking attempts.
Q4 What is the purpose of patch management?
Patch management is the process of acquiring, testing, and applying software
updates (patches) to an operating system, applications, and other software.
These patches fix security vulnerabilities, improve system stability, and
enhance performance.
Purpose of Patch Management:
1. Security Enhancement – Fixes vulnerabilities that could be exploited by
hackers, preventing malware attacks and data breaches.
2. Bug Fixes & Stability – Resolves software glitches, crashes, or
compatibility issues, ensuring smooth system operation.
3. Performance Improvements – Optimizes system performance by fixing
inefficiencies and improving functionality.
4. Compliance & Regulations – Ensures organizations meet security and
industry standards (e.g., GDPR, HIPAA).
5. Feature Updates – Introduces new features or improvements to existing
ones, enhancing user experience.
Q5 Name two commonly used antivirus software solutions.
Two commonly used antivirus software solutions are:
1. Microsoft Defender Antivirus – Built into Windows, it provides real-time
protection against malware, ransomware, and other threats.
2. Norton Antivirus – A popular antivirus solution offering comprehensive
security features, including malware protection, firewall, and identity
theft protection.
Q6 What is Secure Boot?
Secure Boot is a security feature found in modern UEFI (Unified Extensible
Firmware Interface) firmware that ensures a computer only loads trusted and
digitally signed operating system bootloaders and drivers. It helps protect
against malware, such as rootkits and bootkits, that attempt to modify the
boot process.
How Secure Boot Works:
1. When the computer starts, UEFI checks the digital signatures of the
bootloader and critical system files.
2. If the signatures are valid (signed by trusted vendors like Microsoft or
Linux distributions), the system proceeds with booting.
3. If an unauthorized or unsigned component is detected, Secure Boot
blocks the process to prevent security threats.
Benefits of Secure Boot:
✅ Prevents unauthorized OS or malware from loading during startup.
✅ Protects against rootkits and bootkits.
✅ Ensures only trusted firmware and drivers are executed.
Q5 Explain how access controls help in operating system
security.
Access Controls in Operating System Security
Access controls are security mechanisms that regulate who or what can
access resources within an operating system. They help protect sensitive
data, system files, and resources from unauthorized access or modification.
How Access Controls Enhance OS Security:
1. User Authentication – Ensures only authorized users can log in using
credentials such as passwords, biometrics, or multi-factor authentication
(MFA).
2. Authorization & Permissions – Grants or restricts user access to files,
applications, and system settings based on roles (e.g., administrator,
standard user).
3. Role-Based Access Control (RBAC) – Assigns permissions based on
predefined roles, minimizing security risks by following the principle of
least privilege (users get only the access they need).
4. Mandatory Access Control (MAC) – Enforces strict policies where access
permissions are controlled by the OS and cannot be changed by users.
Often used in high-security environments.
5. Discretionary Access Control (DAC) – Allows resource owners to define
who can access or modify their files and directories.
6. Audit Logs & Monitoring – Tracks user activities and access attempts,
helping to detect suspicious behavior or unauthorized access attempts.
Benefits of Access Controls:
✅ Prevents unauthorized users from accessing sensitive data.
✅ Reduces insider threats by limiting user privileges.
✅ Enhances overall system integrity and security compliance.
Q8 Describe why software updates are important for security.
Why Software Updates Are Important for Security
Software updates are critical for maintaining security as they patch
vulnerabilities, improve system stability, and protect against cyber threats.
Neglecting updates can leave systems exposed to malware, hackers, and
performance issues.
Key Reasons Software Updates Are Essential for Security:
1. Patch Security Vulnerabilities – Cybercriminals exploit weaknesses in
outdated software to launch attacks. Updates fix security flaws before
they can be exploited.
2. Protection Against Malware & Cyber Threats – Many updates include
new security definitions to defend against evolving threats like viruses,
ransomware, and spyware.
3. Bug Fixes & System Stability – Updates resolve software glitches and
crashes, preventing security risks that arise from system failures.
4. Enhancing Security Features – Developers often improve existing
security measures, such as stronger encryption and better access controls.
5. Compliance with Security Standards – Many industries require updated
software to comply with legal and regulatory standards (e.g., GDPR,
HIPAA).
6. Preventing Zero-Day Attacks – Zero-day vulnerabilities are unknown
security flaws that hackers exploit before developers can respond.
Regular updates minimize exposure.
Best Practices for Software Updates:
✅ Enable automatic updates when possible.
✅ Regularly check for and install OS and application updates.
✅ Keep antivirus and security software updated.
Q8 How does encryption contribute to data security?
How Encryption Contributes to Data Security
Encryption is a security technique that converts data into an unreadable format
(ciphertext) to prevent unauthorized access. Only authorized users with the
correct decryption key can access the original data (plaintext).
Key Ways Encryption Enhances Data Security:
1. Protects Data Confidentiality – Ensures that only authorized users can
read sensitive data, preventing leaks and unauthorized access.
2. Secures Data in Transit & Storage –
o In Transit: Encrypts data sent over networks (e.g., HTTPS, VPNs)
to prevent interception.
o At Rest: Encrypts stored data (e.g., on hard drives, cloud storage)
to prevent unauthorized access if stolen.
3. Prevents Data Breaches – Even if attackers steal encrypted data, they
cannot use it without the decryption key, reducing the impact of breaches.
4. Ensures Regulatory Compliance – Many industries require encryption to
protect sensitive data (e.g., GDPR, HIPAA, PCI-DSS).
5. Enhances Authentication & Integrity – Encryption works with digital
signatures and hashing to verify data authenticity and detect tampering.
Types of Encryption:
🔹 Symmetric Encryption – Uses one key for both encryption and decryption
(e.g., AES).
🔹 Asymmetric Encryption – Uses a public key for encryption and a private key
for decryption (e.g., RSA).
Q9 Explain the difference between a virus and malware.
Feature

Definition

Spread Mechanism

Examples

Damage

Q10 Describe the role of antivirus software in cybersecurity.


Role of Antivirus Software in Cybersecurity
Antivirus software is a critical cybersecurity tool that detects, prevents, and removes malicious software
(malware) from computers and networks. It helps protect against viruses, worms, trojans, ransomware,
spyware, and other cyber threats.
Key Functions of Antivirus Software:
1. Malware Detection & Removal – Scans files, programs, and the system for known malware
signatures and removes threats.
2. Real-Time Protection – Continuously monitors system activity to detect and block threats before the
can cause damage.
3. Behavioral Analysis – Uses heuristic techniques to identify unknown or emerging threats based on
suspicious behavior.
4. Quarantine & Sandboxing – Isolates suspicious files to prevent them from infecting the system whil
they are analyzed.
5. Firewall & Web Protection – Some antivirus solutions include firewall features to block unauthorize
access and web filters to prevent access to malicious websites.
6. Email & Phishing Protection – Scans email attachments and links to detect and block phishing
attempts and malicious content.
7. Automatic Updates – Regularly updates virus definitions to stay protected against new and evolving
threats.
Why Antivirus Software is Important:
✅ Prevents cyberattacks that can steal sensitive data.
✅ Protects system performance by preventing infections that slow down computers.
✅ Reduces risk of identity theft by blocking spyware and keyloggers.
✅ Enhances overall cybersecurity when combined with firewalls, encryption, and other security measures.
Q12. What happens if a system does not follow a secure boot process?
Key Differences:

You might also like