You are on page 1of 3

Beatingo, Dave Bryan J.

ADVANCED OS AND NETWORKING

1. Discuss the primary design features of current operating systems and the security
implications.
 Current operating systems' primary design features are intended to provide
convenience, reliability, security, and speed to users in order to give a positive
user experience in the operating systems. With today's operating systems, the
focus is mostly on user experience and security, as it attempts to meet user
needs such as modern user interfaces and features for ease of access and
efficient processes.
In terms of security, it provides the latest antivirus protection, this means real-
time protection. Your device will be actively protected from the moment you
start using operating system, it continually scans for malicious software,
viruses, and security threats. In addition to this real-time protection, updates
are downloaded automatically to help keep your device safe and protect it
from threats.
As a result, design, implementation, maintenance, adaptability, and efficiency
are all goals of the operating system.
2. What are the security measures that you would take to protect hardware and
software?
 Hardware security measures:
o Regular Maintenance
 Regular maintenance for proper functioning of the computer.
We should clean our computer and peripherals.
o Insurance
 As people have insurance so does the computer. If the
computer is damaged of theft, we can claim the insurance
amount and get the system replaced with the new one.
o Dust and smoke free environment
 Dust is one of the major factor which causes infection to our
computer system. We should use dust cleaner or cover to
prevent our computer from dust
o Air Condition
 There should be proper air condition to maintain suitable
temperature in the computer system.
o Power protection device
 The fluctuations in electric voltage or frequent power failure
can damage computer hardware. The device that protects the
computer system from the fluctuation of electric voltage or
frequent power failure is known as power protection devices
such as UPS.
 Software security measures:
o Install and update Anti-Virus
 This will prevent your system files getting corrupted or lost and
also prevent computer from getting infected with the virus.
o Scan Your Computer for Spyware Regularly
 Spyware and adware are programs that monitor your Internet
activity and potentially relay information to a disreputable
source.
o Keep up with system and software security updates
 Software and security updates can often seem like an
annoyance; it really is important; it often cover security holes.
o Enable firewall
 A firewall acts as a barrier between your computer or network
and the internet. It effectively closes the computer ports that
prevent communication with your device. This protects your
computer by stopping threats from entering the system and
spreading between devices. It can also help prevent your data
leaving your computer.
o Password protect your software and lock your device
o Encrypt your data
 One way to ensure it doesn’t fall into the wrong hands and
cannot be taken easily is to encrypt your data.
3. Discuss the requirements of operating systems for use in embedded computers. Be
sure to cite your sources.
 We can define embedded control system as combination of hardware and
software, respectively also additional mechanical or others parts. In contrast to
personal computer is designed mainly to accomplish some specific objective.
Mostly used embedded operating systems are VxWorks, OS-9, QNX Windows
CE and VRTX mainly. There are engage to them Linux based operating systems
in last few years. We talk about so-called real-time operating systems, which
are able to respond at the rate of microseconds order.
Real-time operating system should meet the following requirements:
o Operating system must be multitasked (and multi-threaded).
o Preemptive priority driven system - tasks and threads must have
priorities. Sufficient number of priorities must be available.
o Priority inheritance mechanism must exist.
o Operating system must support predictable thread synchronization
mechanism.
o Priority inversion handling mechanism has to exist.
o Clock and timer services should be available - Clock services are used
to maintain the time of day, which is in turn used by the kernel timer
calls to implement interval timers.
o Behavior of operating system should be good known and predictable.

You might also like