Professional Documents
Culture Documents
Operating System Sec&Session
Operating System Sec&Session
Session 6: Types of OS
- Mainframe Operating Systems
- Server Operating Systems
- Multiprocessor Operating Systems
- Personal Computer Operating Systems
- Handheld Computer Operating Systems
- Embedded Operating Systems
- Sensor-Node Operating Systems
- Real-Time Operating Systems
- Smart Card Operating Systems
Summary
Questions and answers
Unit 2: Process Management
Session 1: Process
- The Process Model
- Process Creation
- Process Termination
- Process Hierarchies
- Process States
- Implementation of Processes
- Modeling Multiprogramming
Session 2: Threads
- The Classical Thread Model
- POSIX Threads
- Implementing Threads in User Space
- Implementing Threads in the Kernel
- Hybrid Implementations
- Scheduler Activations
- Pop-Up Threads
- Making Single-Threaded Code Multithreaded
Summary
Questions and answers
Unit 3: Memory Management
Session 1: Memory abstraction
- The Notion of an Address Space
- Swapping
- Managing Free Memory
Session 3: Directories
- Directories
- Directory Implementation
- Single-Level Directory Systems
- Hierarchical Directory Systems
- Path Names
- Directory Operations
Session 6:
Summary
Questions and answers
Unit 5: Input/Output Management
Session 1: I/O hardware
- I/O Devices
- Device Controllers
- Memory-Mapped I/O
- Direct Memory Access
- Interrupts Revisited
Session 4: Disks
- Disk Hardware
- Disk Formatting
- Disk Arm Scheduling Algorithms
- Error Handling
- Stable Storage
Summary
Questions and answers
Unit 6: Security
Session 1: Security environment
- Threats
- Attackers
Session 2: OS security
- How to build a secure system
- Trusted Computing base
-
Session 3: Access control
- Protection Domains
- Access Control Lists
- Capabilities
Session 4: Models of security system
- Multilevel Security
- Covert Channels
Session 5: Authentication
- Authentication Using a Physical Object
- Authentication Using Biometrics
Session 6: Malware & defences
- Trojan Horses
- Viruses
- Worms
- Spyware
- Firewalls Antivirus and Anti-Antivirus Techniques
- Code Signing
- Jailing
- Model-Based Intrusion Detection
Summary
Questions and answers