Both some of the tools and a place in which to use

This preview shows page 3 - 6 out of 11 pages.

both some of the tools and a place in which to use them, the users possesses the goal or objective. Perhaps the purpose is to write a security evaluation, or sales report. The user provides the instructions for the OS to carry out.
Image of page 3

Subscribe to view the full document.

Operating Systems Vulnerabilities 4 3. Kernels and Applications The programs that enable the OS to perform these tasks are called kernels. Every operating system has a kernel. Windows, mac OS, iOS, Android, Chrome OS, and Linux each have a low-level system that's responsible for interfacing all applications with the physical hardware of the computer. Without the kernel, none of your applications would be able to make use of the physical computer; apps like Firefox, Chrome, LibreOffice, MS Office, or Outlook wouldn’t work. The kernel is also responsible for allowing processes to exchange information using what is called Inter-Process Communication (Wallen, 2018) . An application by contrast runs on top of these processes. These are the programs a user has common interaction with. PowerPoint or outlook are good examples of applications, both are tailored to the completion of a specific user goal, both are run on Windows OS. What these
Image of page 4
Operating Systems Vulnerabilities 5 programs do not do is communicate directly with various pieces of hardware, they relay instructions (through kernels) to the various places it is requires. In return input is received through kernels which have relayed this information from hardware. 4. OS Types The four most common operating systems types are, Windows OS, MAC OS, and Linux, and mobile operating systems. There are different versions of each type with varying compatibility to related OS some are simply updated versions while others are spinoffs of the main OS type. In 2017 49% of systems ran a Windows OS with less than 10% using MAC OS, and the remainder using mobile or other OS (Canvas, 2018). Some of these mobile or other OS are also derived from or based on Linux OS. Windows is the most popular OS currently run on systems. Developed by Microsoft Corporation it is the primary operating system of most personal computers and the majority of business systems. This popularity can be a double edge sword. While the OS received good development support for both the OS and applications its wide use also makes it one of the most targeted OS. When a vulnerability is discovered it can quickly cause high levels of damage if not addressed quickly. MAC OS is designed by Apple Inc. to run specifically on their systems. While it receives a developmental support its narrow distribution and tight control of source code mean less choice in applications. While this originally limited the number of individuals searching for vulnerabilities an increase in usage will likely result in a larger number of exploited vulnerabilities.
Image of page 5

Subscribe to view the full document.

Operating Systems Vulnerabilities 6 Linux OS is an open source OS. This means there are many different varieties of OS based on the Linux foundation. This makes Linux particularly tricky as a vulnerability for an otherwise unrelated Linux based OS could affect a different Linux OS. In addition, as a Linux
Image of page 6
You've reached the end of this preview.
  • Winter '17

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern