Miyerkules, Pebrero 27, 2013

Article


PRELIM

Introducing Operating Systems

n  Operating System:
n  Part of the computing system that manages all ofthe hardware and software
n  Controls every file, every device, every section of main memory, and every nanosecond of processing time
n  Controls who can use the system and how
n  Computer system consists of:
n  Software (programs)
n  Hardware (the physical machine and its electronic components)
n  Essential managers of an operating system:
n  Memory Manager
n  Processor Manager
n  Device Manager
n  File Manager
n  Each manager both works closely with the other managers and performs its unique role
n  User Command Interface is unique to each operating system


Memory Management
§  The performance of the computer system depends mainly of:
=How much memory is available.
=How it is optimized while jobs are being processed

4 Memory Allocations
1.     Single – User Contiguous Scheme
2.     Fixed Partition
3.     Dynamic Partition
4.     Relocatable Dynamic Partition

1.Single – User Contiguous Scheme – A single user scheme supports one user on one computer running one job at a time. Sharing is not possible.
Ex:


2. Fix Partition – memory divided into many unequal size, fixed partitions each partition has to protected.

Ex:
3. Dynamic Partition- jobs are given only as much memory as the request. Still contiguous are needed. Internal fragmentation problem is solved.
Ex:
4.Relocatable Dynamic Partition- the memory relocates program of which it gather togethere all empty blocks. Compact the empty blocks and makes one. Blocks oof memory large enough the accommodate some or all of the jobs waiting to get in.
Ex:



MIDTERM

Processor Management

-responsible for allocating the processor to execute the incoming jobs, the tasks of those job.
2 Sub managers
1.Job Scheduler
-also known as the high level scheduler.
2.Process Scheduler
-known as low-level scheduler.
Job and Process Status
1.      Hold
2.      Ready
3.      Running
4.      Waiting
5.      Finish
Process Control Blocks(PCB)
-a data structure that contains information about current status and characteristics of a process.
Process Identification
Process Status
Process state:
§  Process status word
§  Register content
§  Main memory
§  Resources                                
§  Process priority
Accounting



Process Scheduling Policies

First come,  first serve(FCFS)- a non-preemptive scheduling that handles job according to their arrival time.
Ex:
                

Shortest Job Next (SJN)–a non-preemptive process scheduler algorithm that select the waiting job with the shortest CPU cycle time.
Ex:


             
Priority Scheduling- a non-preemptive process scheduling algorithm that allows for the execution of high priority job before low-priority jobs.


Shortest Remaining time-a preemptive scheduling algorithm similar to SJN.
Ex:



Round Robin-is a preemptive process scheduling algorithm is used extensively in interactive system.
Ex:



Multiple-level Queues- a process scheduling scheme that group jobs according to a common characteristics.

Keys Terms/ Terminologies

A.      Program (Job) – an interactive unit such a a file stored on a disk.
B.      Process (Task)- an instances of execution of a program that is undeniable and controlled by OS.
C.      Processor (CPU)- performs calculation and execution programs.
D.     Interrupt- a hardware signal that suspends execution of a program and activates the execution of interrupt handler.
E.      Queue- a linked list of PCBs that indicates the order which job or process will be serviced.
F.       Preemptive Scheduling Policy- interrupts processing of a job and transfer
G.     Non-preemptive Scheduling Policy- function without external interrupts.
H.     Aging- a policy used to ensure that jobs that have been in the system for a long time in the level queue will eventually complete their execution.
I.        Thread-a portion of a program that can run independently of other portions.
J.        Turnaround time- a system efficiency that tracks the time required to execute a job and return output to the user.



                                                                                  FINAL

                         System Survivability

-the capability of a  system to fulfill it mission in a timely manner, in the presence of attack , failure or accidents.

4 Keys Properties of Survivability
1.       Resistance to attack
2.       Recognition of attack and the extent of damage
3.       Recovery full  and essential services after attack
4.       Adaptation and evolution to reduce effectiveness of  future attacks

Security Breaches

A.)   Unintentional Attack
-          Any breach of security, of modification of data that was not the result of planned intrusions.
B.)   Intentional Attack
*      Denial of Service (DOS) Attacks
-this can be done by flooding server with meaningless request or information.
*      Browsing
-a system security violation in which unauthorized user are not allowed to search through secondary storage for information they should not have the privileged to read.
*      Video tapping
-a system security violations in which unauthorized user monitors or modify user transmission .
*      Trapdoors
-unspecified and undocumented entry point to the system.

Virus- a system written to alter the way of computer operates , without permission or knowledge of the user.
A Virus must meet 2 criteria:
a)    It must be self-executing
b)    It must be self-replicating

A.    Worm –a computer program that replicates itself and is self-propagating in main memory.
B.    Trojan Horse- a malicious computer  with unintended by the user who execute the program.
C.    Bombs
Ø  Logic Bombs
-is a destructive program with a full.
Ø  Time Bombs
-similar to logic bomb but is triggered by a specific time.
*********************************************
Antivirus Software
            -software that is designed to detect & recover from attacks by viruses & worms.

Firewalls
              -a set of hardware and software designed to protect a system by disguising it TP address from outsiders who don’t have authorization to access it.

Authentication
                -is verification that an individual trying to access a system is authorized to do so.

Encryption
                 -translation of a message or data item from its original from to an encoded form.




Miyerkules, Pebrero 20, 2013

The Black Hat and White Hat Hackers


White hat

white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council,[8]also known as the International Council of Electronic Commerce Consultants, is one of those organisations that have developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.[7]

[edit]Black hat

A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005).[9] Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[10] Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. They choose their targets using a two-pronged process known as the "pre-hacking stage".
Part 1: Targeting
The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the primary target that he/she was planning to attack or steal from. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).