Saturday, 17 September 2011

Operating System Does (Networking and Security)

Another aspect of an operating system has to do with the networking capabilities contained in each. The network links separate computers together from different locations.


Most current operating systems are capable of using the TCP/IP networking protocols. That means that one system can appear on a network of the other and share resources such as files, printers, and scanners using either wired or wireless connections.


Security is important in any computer system. The operating system provides a level of security that can protect your computer and the data on it. System security is based on two principles:


That the operating system provides access to many resources either directly or indirectly. That could mean files on a local
disk, privileged system calls, person information about user, and the services offered by the programs running on the system.



That the operating system is capable of distinguishing between those who are allowed to access the resource and those who are forbidden to do so. While some systems may simply distinguish between “privileged” and “non-privileged”, most commonly have a form of register identity such as a user name.




Requesters of information are further divided into two categories:


Internal security in an already running program. On some systems, once a program is running, it has no limitations, but commonly, the program has an identity which it keeps. That identity is used to check all of its requests for resources.


External security as in a new request from outside the computer. This could be in the form of a new request from outside the system such as a login at a connected console or some kind of network connection. To establish identity, there may be a process of authentication.


Often a username must be entered and every username should have a password. Other methods of authentication such as magnetic cards or biometric data may be used instead. In some cases, especially connections from the network, resources may be accessed with no authentication at all.

Operating system security has long been a concern of programmers because of highly sensitive data held on some computers. This is both of a commercial and a military nature.


The US Government Department of Defense created their own criteria of standards that sets basic requirement for assessing the effectiveness of OS security. This became of vital importance to operating system makers because this system was used to classify and select system being considered for the processing, storage ad retrieval of sensitive or classified information.

0 comments:

Post a Comment

Protected by Copyscape Duplicate Content Detection Software myfreecopyright.com registered & protected