Operating System and Computer Security. What does Operating System do Manages all the resource in a computer (including processor, memory, i/o devices)

Slides:



Advertisements
Similar presentations
PC Operating Systems in Review lesson 12. UNIX DOS The Macintosh Operating System Windows 3.x OS/2 Warp Windows NT Windows 95 and 98 Linux Windows 2000.
Advertisements

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 6A Operating System Basics PART II.
What is an operating system? Is it software?
Chapter 8 Operating Systems and Utility Programs.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Linux vs. Windows. Linux  Linux was originally built by Linus Torvalds at the University of Helsinki in  Linux is a Unix-like, Kernal-based, fully.
What You Will Learn Components of a computer’s system software The importance of an operating system Functions of an operating system Types of user interfaces.
CMPTR1 CHAPTER 3 COMPUTER SOFTWARE Application Software – The programs/software/apps that we run to do things like word processing, web browsing, and games.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
Introduction to windows operating system i
1 DOS with Windows 3.1 and 3.11 Operating Environments n Designed to allow applications to have a graphical interface DOS runs in the background as the.
Operating Systems.
Chapter 8 Operating Systems and Utility Programs By: James Granahan.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
Operating System.
Operating Systems Chapter 4.
Learning Outcomes At the end of this lesson, students should be able to: State the types of system software – Operating system – Utility system Describe.
Week 6 Operating Systems.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Operating Systems Basic PC Maintenance, Upgrade and Repair Mods 1 & 2.
Hardware vs. Software Computer systems consist of both hardware and software. Hardware refers to anything you can physically touch. Keyboards, mice, monitors,
University of Management & Technology Operating Systems & Utility Programs.
BUSINESS COMPUTER APPLICATION University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Excellence Publication Co. Ltd. Volume Volume 1.
Operating Systems. Operating systems  Between the hardware and the application software lies the operating system. The operating system is a program.
Software GCSE ICT.
Survey of PC and Network Operating Systems
Module 2 Part I Introduction To Windows Operating Systems Intro & History Introduction To Windows Operating Systems Intro & History.
3 3 3 CHAPTER System Software. 3 Objectives By the end of this lecture, you should know how to: –Describe the differences between system software and.
Agenda Last class: Computer Hardware Today: –Typing for 10 minutes –Computer Software –Journal 2 homework.
CMPF124:Basics Skills for Knowledge Workers Introduction to Windows OS.
Software Writer:-Rashedul Hasan Editor:- Jasim Uddin.
Software Software consists of the instructions issued to the computer to perform specific tasks. –The software on a computer system refers to the programs.
Chapter 4 System Software. Software Programs that tell a computer what to do and how to do it. Sets of instructions telling computers to perform actions.
Computer Fundamentals MSCH 233 Lecture 2. What is a Software? Its step by step instructions telling the computer how to process data, execute operations.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Kuliah 4 Pengantar Teknologi Informasi Oleh Coky Fauzi Alfi cokyfauzialfi.wordpress.com Software.
PC Operating Systems section 6b. UNIX DOS The Macintosh Operating System Windows 3.x OS/2 Warp Windows NT Windows 95 and 98 Linux Windows 2000 This lesson.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Copyright©2008 N.AlJaffan®KSU1 Chapter 7 Operating System and Utility Programs.
Module 2 Part I Introduction To Windows Operating Systems Intro & History Introduction To Windows Operating Systems Intro & History.
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
CMPF124 Basic Skills For Knowledge Workers Chapter 1 – Part 1 Introduction To Windows Operating Systems.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Computer Operating Systems And Software applications.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Operating System Basics. Outline The User Interface Running Programs Managing Files Managing Hardware Utility Software.
Chapter 2 Operating Systems
Operating System & Application Software
Macintosh & Linux Used to fill in pg 5 & 6 of “Operating Systems” Packet.
Lecture 1-Part 2: Operating-System Structures
PC Operating Systems in Review
LINUX WINDOWS Vs..
Chapter 8 Operating Systems and Utility Programs.
Computer Worms & Viruses
LINUX WINDOWS Vs..
McGraw-Hill Technology Education
Chapter 4 The Power behind the Power
Operating System Basics
Lecture 1-Part 2: Operating-System Structures
Chapter 4 The Power behind the Power
PC Operating Systems in Review
Presentation transcript:

Operating System and Computer Security

What does Operating System do Manages all the resource in a computer (including processor, memory, i/o devices) Provides an interface between the hardware and application software.

Mostly used OS Desktop  Windows  Mac OS  Unix/Linux and their siblings. PDA  Palm  Pocket PC  Embedded Linux OS

Macintosh Operating System Evolved from 1984’s original MacOS 1984 Mac was first commercial computer with Graphical User Interface (GUI) and mouse Currently MacOS 9, MacOS X Inventor of trash can, alias (shortcut), pull- down menus, etc. Evolution is progressive change or improvement

Mac OS Details Control Strip Alias (same as shortcut) Single-button Mouse (can be customized) Sherlock 2 (global search utility, copied in Windows 2000 and Windows ME) Easy to use, hard to troubleshoot

Windows OS Windows is built on top of MS-DOS, the MicroSoft-Disk-Operating-System, based QDOS. Windows 1.0 very delayed, very poor quality Windows 3.1 (c. 1992) first usable version, still very limited in comparison to MacOS 6 Windows 95 revolutionary for Intel based computers, but, just a copy of Mac OS Revolution is non-progressive change, major drastic change

Windows 95 Stole Recycle Bin, Shortcuts, and Menu System from Macintosh OS Excellent user-friendliness for operations  Like MacOS, suffers from un-friendliness for troubleshooting Excellent multi-tasking capabilities (run multiple programs)-uses virtual memory

Multi-tasking The ability to run several programs at the same time. CPU can only run one program at a time. OS will switch programs for it. Since the switching is so fast, it looks like running multiple programs at the same time. Two multi-task mechanism  Cooperative multi-tasking (program voluntarily release CPU )  Preemptive multi-tasking.(OS deprives the CPU control when time is up)

Windows History Windows 95 for home machines, stable, simple Windows NT 4.0 for business/office computers Windows 98 replaces 95, very unstable, just a facelift  W98 Release 2 much better, still sucked Windows 2000 replaces Win NT 4.0  Incredibly stable, not very backwards compatible Windows ME (Millennium Edition) replaced W98 (fall 2000)  Almost no new features  Seems a little more stable than W98  Faster Startup

Windows XP Released last year Home version and business version based on same OS  Previously, Win NT & 95 different, 2000 and ME different More stable than Win 98/ME, not as stable as W2000

Linux and Unix Unix was the first usable OS and still widely used today. It runs on special computers, e.g. Sun, Silicon Graphics, HP, DEC Linux was a miracle, initalized by Linus Torvalds and maintained by programmers all over the world. Both are based on a stable command line OS  By comparison, Windows based on unstable command line OS, MS-DOS Both Linux and Unix use an X- Windows GUI

Ranking the Operating Systems Unix Linux Mac OS X Windows 2000 Mac OS 9 Windows NT DOS Windows 95 Windows ME Windows 98 Mac OS 9 Windows ME/98/95 Mac OS X Windows 2000/NT Linux Unix DOS! StabilityEase of Use

Future of Operating Systems Microsoft must address stability problems in home computers – Windows XP was a small step Linux becomes more popular, but only for advanced users and in server market. Macintosh’s market penetration more based on hardware appeal rather than software  In old days, Macs succeeded because they were the only GUI on the block. People bought Macs for the software  Windows is such a good copy that hardware, reliability, and price is now a big reason for the purchase of a Macintosh

Computer security challenges Virus Virus Worm Trojan Horse Spam

Virus Viruses are fragments of computer code that can piggyback on the normal programs  When normal program is infected by virus, virus will run first every time you start the program. Viruses can duplicate themselves and infect other programs. Original virus are less and less popular now.  People don’t copy files from others, but would rather download from the original source.  Anti-virus software is widely used.

virus An virus moves around in messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's address book. messages Two kinds  Executable attachment (.exe.vbs.com.bat files).  Macro language viruses.

Fact about virus BOTTOM LINE :There is *NO* such thing as an text virus! You can not get a virus or any system damaging software by reading an *. E- mails (that is, the ACTUAL message can not contain viruses) viruses always resides in the attachment. So don’t run any suspect attachment files.

Worm A worm is a computer program that has the ability to copy itself from machine to machine by taking advantage of the security hole in the system. Security holes are bugs in the OS. This is the most serious threat now  Your Computer can be infected by just plugging in the internet.  MSblast and SoBig are the recent worms that damage hundreds of thousand computers.

Trojan Horse (back door) A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk).hard disk Trojan horse usually does replicate itself.

Suggestions to secure your computer Use anti-virus software. Update your computer regularly. Be careful with the attachments  Safe:.jpg.bmp.pdf.txt ….  Unsafe:.exe.doc.xls.ppt … Avoid software by Microsoft (outlook, outlook express…). They are mostly targeted. Use firewall or router to protect you from worm attack.

Spam (junk mail) Spamming is business  Most effective way to stop it is legislation. Most states passed law to restrict it, but none fully banned it. How spammers get your mail.  Web search  Sending test s  Exchange or buy from other spammers A case study: How an can HTML reveal your identity.

Suggestions to fight spam Never reply junk s Moreover, never even open them. Don’t post your actual address in the website.  Sparty_at_msu.edu   Use a picture of your address. When send group s, put all the recipients in the BCC field to protect other people.