Types of Oparating Systems. Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Operating System.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Essential Introduction to Computers. What is a Computer? An electronic device, operating under the control of instructions stored in its own memory, that.
Grid Security. Typical Grid Scenario Users Resources.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Chapter 1. What is computer fluency? The knowledge possessed by people who are able to navigate the digital world successfully NOT THIS.
Microsoft Office 2007 Essential Introduction to Computers.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
1 DOS with Windows 3.1 and 3.11 Operating Environments n Designed to allow applications to have a graphical interface DOS runs in the background as the.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Chapter 4 Operating Systems and File Management. 4 Chapter 4: Operating Systems and File Management 2 Chapter Contents  Section A: Operating System Basics.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Masud Hasan Secue VS Hushmail Project 2.
Introduction To Computer System
June 2009 Memory Reed Harris County High School What is E-Commerce? MKT-EM-2.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Computing and the Web Operating Systems. Overview n What is an Operating System n Booting the Computer n User Interfaces n Files and File Management n.
Microsoft Office 2007 Essential Introduction to Computers.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
Computer Architecture
Storage Devices A storage device is used to store instructions, data, and information when they are not being used in memory – Magnetic disks use magnetic.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Chapter 1 Basic Concepts of Operating Systems Introduction Software A program is a sequence of instructions that enables the computer to carry.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
INTRODUCTION TO COMPUTERS. A computer system is an electronic device used to input data, process data, store data for later use and produce output in.
1 OPERATING SYSTEMS. 2 CONTENTS 1.What is an Operating System? 2.OS Functions 3.OS Services 4.Structure of OS 5.Evolution of OS.
Computer and Internet Basics
TOPIC: HTTPS (Security protocol)
Web Security CS-431.
Operating System & Application Software
2. OPERATING SYSTEM 2.1 Operating System Function
Grid Security.
Computers Are Your Future
Information Technology Ms. Abeer Helwa
Types of Software Mrs. S. Palmer Office Administration.
Designing IIS Security (IIS – Internet Information Service)
Electronic Payment Security Technologies
Presentation transcript:

Types of Oparating Systems

Operating Systems Is a software system, a set of computer programs designed to perform many tasks including the effective management of its resources. It can be found in most electronic devices that use microprocessors to operate.

The operating systems, as a software layer that enables and simplifies the management of the computer, perform a variety of basic functions, each one held by an internal component: Provide comfort in using a computer Services for running processes (programs) Provide an interface to the user, executing instructions (commands).

Types of operating systems Batch processing system: data or programs area collected grouped and processed at a later date. Ex. Payroll. Real-time systems: inputs immediately affect the outputs, timing is critical. Ex. Control of nuclear power plants. Real-time transaction: inputs immediately affect the outputs but timing is not critical. Ex. Holiday and airline booking system.

Online processing: processing performed under the direct control of the CPU. Offline processing: processing which is done away from CPU. Ex. Batching together of clocks cards. Multi-access on-line: any users linked by workstations to a central computer such as in a network

Interactive processing: the user has to be present an program can’t proceed until there is some input fron the user. Distributed system: processing is carried out independently in more than one locatio, but with shared and controlled access to some common facilities. Multi tasking: the ability to hold several programs in RAM at one time but the user swithches between them.

Examples There are many operating systems, but all descend from two primitive operating systems: the DOS (Disk Operating System) and the UNIX. (Other primitive operating systems like the VMS, the RTL2, the CP/M, the MP/M, the VME/B Exist…) Both operating systems had like user interface the line of commands: the DOS was the simplest and UNIX was the most powerful. The DOS was developed in 1979 by Tim Paterson working for Seattle Computer Products and was bought by Microsoft Corporation, and the UNIX was designed in 1971.

Differences between the DOS and the UNIX. DOSUNIX The names of the archives can only have up to 8 characters and the extension up to three, also there are certain characters that they can’t be used in the names(*). The extension indicates us the type of file for example :.txt  text file.bmp  image DOS, doesn’t distinguish between capital letters and lowercase letters. The names don’t have extension that’s because a file can have so many points as we want in its name, in fact, the name can have up to 256 characters. There are reserved chacters(*). The feasible ones are distiguished in this case by which it’s not seen in the name: the execution permission. UNIX, distinguish between capital letters and lowercase letters.

Most common operative systems Windows 95 Windows 98 Windows ME Windows NT Windows 2000 Windows 2000 server Windows XP Windows Server 2003 Windows CE Windows Mobile Windows XP 64 bits Windows Vista (Longhorn) Mac OS 7 Mac OS 8 Mac OS 9 Mac OS X UNIX AIX AMIX GNU/Linux GNU / Hurd HP-UX Irix Minix System V Solaris UnixWare

AIX AMIX GNU/Linux GNU / Hurd HP-UX Irix Minix System V Solaris UnixWare

* Estimation of the present use of operating systems according to a sample of computers with access to Internet.

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information. In many contexts, the word encryption also implicitly refers to the reverse process, decryption ( “software for encryption” can typically also perform decryption), to make the encrypted information readable again (to make it unencrypted).

uses used by militaries and governments to facilitate secret communication Encryption can be used to protect data "at rest", such as files on computers and storage devices ex. USB flash drives Encryption is also used to protect data in transit, for example data being transferred via networks

Secure Sockets Layer (SSL): How It Works Secure Sockets Layer (SSL) technology protects your Web site and makes it easy for your Web site visitors to trust you in three essential ways:SSL An SSL Certificate enables encryption of sensitive information during online transactions. Each SSL Certificate contains unique, authenticated information about the certificate owner. A Certificate Authority verifies the identity of the certificate owner when it is issued.

You need SSL if... you have an online store or accept online orders and credit cards you offer a login or sign in on your site you process sensitive data such as address, birth date, license, or ID numbers you need to comply with privacy and security requirements you value privacy and expect others to trust you.

How Encryption Works Imagine sending mail through the postal system in a clear envelope. Anyone with access to it can see the data. If it looks valuable, they might take it or change it. An SSL Certificate establishes a private communication channel enabling encryption of the data during transmission. Encryption scrambles the data, essentially creating an envelope for message privacy.SSL Certificate Each SSL Certificate consists of a public key and a private key. The public key is used to encrypt information and the private key is used to decipher it. When a Web browser points to a secured domain, a Secure Sockets Layer handshake authenticates the server (Web site) and the client (Web browser). An encryption method is established with a unique session key and secure transmission can begin.