Sie sind auf Seite 1von 5

Reymart bara

BSIT 2r7

1. We have stressed the need for an operating system to make efficient use of the
computing hardware. When is it appropriate for the operating system to forsake
this principle and to “waste” resources? Why is such a system not really
wasteful?

High performance systems need to make use of hardware very efficiently because cost
will dominate when you start buying hundreds of thousands of computers, you’re
talking about wasting petabytes of RAM. It makes sense to put a team of engineers on
using these resources efficiently because the economics make sense. In user facing
systems, it makes sense to prioritize user experience over optimal use of hardware.
For example, screensavers are a terrible waste of resources, but humans like them so
we use them. We use animations, and ship computers with thousands of images and
audio assets to make the system feel more natural. None of these are in pursuit of
performance, but rather optimize for user experience. It’s hard to say one is wasteful,
because like any engineering decision, there are trade offs to be made.

2. How does the distinction between kernel mode and user mode function as a
rudimentary form of protection (security) system?

The distinction between kernel mode and user mode provides a rudimentary form of
protection in the following manner. Certain instructions could be executed only when
the CPU is in kernel mode. Similarly, hardware devices could be accessed only when
the program is executing in kernel mode. Control over when interrupts could be
enabled or disabled is also possible only when the CPU is in kernel mode.
Consequently, the CPU has very limited capability when executing in user mode,
thereby enforcing protection of critical resources.

3. Identify several advantages and several disadvantages of open-source


operating systems. Include the types of people who would find each aspect to be
an advantage or a disadvantage

In a computer system Operating system is an essential component of system software.


Operating system is a system software that manages all the hardware and software
resources and provides common service to all the system programs. There are many
software’s available freely in the market. In recent years open source has gained more
popularity. The open source operating system is available freely to the users and any
user can modify its code at any time. As it is not dependent on any company, so the
code will be available anytime. Linux is one of the examples of open source operating
system. This type of operating systems are very useful for students, independent
developers and small scale business people. But at the same time it creates some
problems for students, small scale business people, and competitors too. So it has
many advantages and disadvantages too. Some of them are mentioned below:
Advantages:
 Availability of source code to tailor modules to individual needs
 More support in developing stage
 Less expensive
 Portable with any type of hardware and software
 Easier licensing
 Several vendors for same OS
 Improved security as flaws are analyzed by "many eyes"
 Improved quality
Disadvantages:
 Might not get support when required as there is no obligation
 Projects can be abandoned
 It has no warranty and guarantee
 Chances for intellectual property infringements

4. Original versions of Apple’s mobile iOS operating system provided no means


of concurrent processing. Discuss three major complications that concurrent
processing adds to an operating system.

The OS must be kept inform of the main memory space that is allocated to each
process. When the OS needs to switch from one processor to the next. If a running
process requires large space in memory, then other process needs to be dumped back to
hard disk which again leads to time overhead.

5. Name two differences between logical and physical addresses.

A logical address does not refer to an actual existing address; rather, it refers to an
abstract address in an abstract address space. Contrast this with a physical address that
refers to an actual physical address in memory. A logical address is generated by the
CPU and is translated into a physical address by the memory management
unit(MMU). Therefore, physical addresses are generated by the MMU.
In short
LOGICAL ADDRESS
The user can view the logical address of a program. The Logical Address is generated
by the CPU
PHYSICAL ADDRESS
The user can not directly access physical address. Physical Address is Computed by
MMU

6. A password may become known to other users in a variety of ways. Is there a


simple method for detecting that such an event has occurred? Explain your
answer.

If a system prints the last time the login was used to log on then the user could see if it
has been used inappropriately.

7. Make a list of six security concerns for a bank’s computer system. For each
item on your list, state whether this concern relates to physical, human, or
operating-system security.

8. Some systems automatically delete all user files when a user logs off or a job
terminates, unless the user explicitly requests that they be kept. Other systems
keep all files unless the user explicitly deletes them. Discuss the relative merits of
each approach.

Deleting all files not specifically saved by the user has the advantage of minimizing
the file space needed for each user by not saving unwanted or unnecessary files.
Saving all files unless specifically deleted is more secure for the user in that it is not
possible to lose files inadvertently by forgetting to save them.

9. Give some best practices to ensure security on your OS.

Encryption - SSL
Insertion of cryptography at one layer of the ISO network model (the transport layer)

*SSL – Secure Socket Layer (also called TLS)


* Cryptographic protocol that limits two computers to only exchange messages with
each other
*Used between web servers and browsers for secure communication (credit card
numbers)
*The server is verified with a certificate assuring client is talking to correct server
*Asymmetric cryptography used to establish a secure session key (symmetric
encryption) for bulk of communication during session
User Authentication
*Crucial to identify user correctly, as protection systems depend on user ID
*User identity most often established through passwords, can be considered a special
case of either keys or capabilities
*Passwords must be kept secret
Passwords
*Encrypt to avoid having to keep secret
*One-time passwords
*Bio-metrics
*Multi-factor authentication
Implementing Security Defenses
Firewalling to Protect Systems and Networks
Network Security Through Domain Separation Via Firewall

10. Summarize what you have learned on Platform Technologies on midterm


period.

What I learned about is, connection of the management, how disk and memory work
together , kinds of management, how operating system works, kinds of operating
system, how to make the security and protection more secure, kinds of attacks and
threat, function of file systems, we also learned how to install windows operation
system, how to ping and configure IP address , and we learned how to used server and
dhcp, fire wall and so on

Das könnte Ihnen auch gefallen