Project 1 - SAR.docx - Running head: Security Assessment...

This preview shows page 1 - 4 out of 16 pages.

Running head:Security Assessment Review1Security Assessment Review: Project 1University of Maryland Global CampusCBR 610 9040
Security Assessment Review2Defining the OSOperating Systems are an essential piece when it comes to an Information System’sarchitecture.The operating system (OS) is the system software that manages computerhardware, software resources and provide services for the user.The goal of the OS is to providethe following:1.Optimum and efficient use of the computer system hardware2. To provide the user with convenience and user friendliness3. Hide the complexity of the computer hardware (Garg and Verna 2017).The operating system is just part of a component when it comes to an Information System’sarchitecture.Information Systems can be defined as a combination hardware, software, andtelecommunications networks that people build and use to collect, create, and distribute usefuldata, typically in organizational settings.The user’s role in an OSWhen we think of information systems, the user is usually a forgotten component(Bourgeois 2014).It is the user who interacts with the OS to run applications on a computer orserver.The role of the user in the OS can be broken down by:1.Interacting with the OS via hardware2.Run and maintain systems/applications3.Manage hardware resources of the computer4.Navigate OS through UI components5.Perform business/personal tasks with provided applications6.Troubleshooting issues with tools and applications included in the OS
Security Assessment Review3Differences between kernel applications of the OS and the applications installed by anorganization or userKernel applications communicate with the OS at a high level and dictate the machine’sperformance.At the kernel level, it acts as a bridge between applications and data processingperformed at hardware level using inter-process communication and system calls (Pankaj 2020).Kernels are embedded in every OS and perform tasks ranging from managing memory toutilizing CPU resources.They have unlimited access to computer resources to function andprocess commands.User applications are isolated and usually perform functions sequentially and in isolation.Unlike Kernel applications, they do not have unlimited access to computer resources to execute.If a user application crashes, it does not affect other applications or services and usually arerecoverable.The Embedded OSThe embedded OS is designed for use with an embedded computer system.Itis designed to run as efficiently as possible using least amount of resources to accomplishtasks and is designed to be reliable.One example of an embedded OS is those that exist ontoday’s Smart TVs.Their purpose is to ensure the television can function and run applicationsfor the user to enjoy the capabilities of said Smart Television.It cannot run applications that anormal OS would run on a desktop or server.Another example is those on ATM machineswhich allow the user to operate the machine at its core level.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 16 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
NoProfessor
Tags
Computer Security, Security Assessment Review

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture