0% found this document useful (0 votes)
50 views3 pages

OS Theory

Uploaded by

reyan.24n67e
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views3 pages

OS Theory

Uploaded by

reyan.24n67e
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

Firewall in OS:

With the increasing number of cybercrimes with every passing day, individuals and
companies must secure their information.

A firewall is one such security device that can help you safeguard your network and
device from an outsider.

Firewalls are network security systems. They are a vital component of network
security.

Assignment:
Difference Between a Firewall and Antivirus? Also Explain the Algorithm of an Avast
Antivirus? Also draw the system architecture diagram?

Starvation:

Starvation occurs when one or more threads in your program are blocked from gaining
access to a resource and, as a result, cannot make progress.

Starvation is the problem that occurs when low priority processes get jammed for an
unspecified time as the high priority processes keep executing.

A steady stream of higher-priority methods will stop a low-priority process from


ever obtaining the processor.

Understanding OS Security: Threats and Security Controls:

The term operating system (OS) security refers to practices and measures that can
ensure the confidentiality, integrity, and availability (CIA) of operating systems.

The goal of OS security is to protect the OS from various threats, including


malicious software such as worms, trojans and other viruses, misconfigurations, and
remote intrusions.

Malware
Malware is short for malicious software, which encompasses a range of attack
vectors such as viruses, worms, trojans, and rootkits. Malware is injected into a
system without the owner’s consent,

A worm a type of malware that is designed to replicate itself and spread across
networks to infect multiple computers. The payload of the worm may vary
significantly, anything such as deleting files, installing backdoors, stealing
information, using up network bandwidth, and installing additional malware

Network Intrusion:

Network intrusion occurs when an individual gains access to a system for improper
use.

---------------------------------------------
Authentication Measures of OS:

Authentication involves matching an identified user with the programs or data they
are allowed to access. All operating systems have controls that can be used to
verify that users who run a particular program are authorized to do so.
You can use the following techniques to authenticate users at the operating system
level:

Security keys: keys are provided by a key generator, usually in the form of a
physical dongle. The user must insert the key into a slot in the machine to log in.

Username-password combinations: The user enters a username that is registered with


the OS, along with a matching password.

Biometric signatures: The user scans a physical attribute, such as a fingerprint or


retina, to identify themselves.

Multi-factor authentication: Modern authentication systems use multiple methods to


identify a user, combining something the user knows (credentials), something they
own (such as a mobile device), and/or a physical characteristic (biometrics).

Assignment: What are Torjan Horse and DoS attacks? How do they attack in systems?

Why Clouds:

AWS: Amazon Web Services


EC2: Elastic Compute Cloud
S3: Simple Storage Service
EBS: Elastic Block Storage
Microsoft Azure
Google Compute Engine
Rightscale, Salesforce, EMC, Gigaspaces, 10gen, Datastax, Oracle, VMWare, Yahoo,
Cloudera
And many many more !!!

Two categories of clouds:

-Can be either a public or private cloud.


-Private clouds are accessible only to company employees
-Public clouds provide service to any paying customer
-Amazon S3 (Simple Storage Service): store arbitrary datasets, per GB-month
stored.
-Amazon EC2 (Elastic Compute Cloud): upload and run arbitrary OS images, pay
per CPU hour used.
-Google App Engine/Compute Engine: develop applications within their App
Engine framework, upload data that will be imported into their format, and
run.

Customers save time and $$$:


Dave Power, Associate Information Consultant at Eli Lilly and Company:
With AWS, a new server can be up and running in three minutes (it used to
take Eli Lilly seven and a half weeks to deploy server internally) and a 64-node
Linux cluster can be online in five minutes (compared with three months
internally). … Its just shy of instantaneous

Ingo Elfering, Vice President of Information Technology Strategy, GlaxoSmithKline:


With Online Services, we are able to reduce our IT operational costs by
roughly 30% of what we’re spending.
Google DC:
https://www.youtube.com/watch?v=XZmGGAbHqa0

FaceBook DC:
https://www.youtube.com/watch?v=_r97qdyQtIk

You might also like