Term Paper on "Operating System Discuss the Relative Advantages"

Term Paper 10 pages (3006 words) Sources: 10

[EXCERPT] . . . .

Operating System

Discuss the relative advantages and disadvantages of at least three different measures used to protect operating systems

There is a great increase in the need for protection with the aim of enhancing the integrity of the computer systems because of sophisticated and pervasive applications in the modern society. Operating system refers to the computer applications vital in the operations and management of the software and hardware computer programs. Modern protection concepts in relation to the operating systems have evolved for the purposes of enhancing reliability of the complex systems utilizing the application of shared resources. There are various needs for the implementation of a mechanism towards protection of the operating systems. The main objective for protection of the operating system is to prevent mischief, intentional, and violating access in relation to restriction by users.

There is also need to ensure that the program components remain active with the aim of promoting the stated policies and directives. It is also ideal to note the existence of various mechanisms towards the achievement of effective and efficient protection of the operating systems in the modern society with reference to the evolution. Operating consists of various objects, hardware, and software. Each object has unique name thus accessible through a well-defined set of principles. Protection problem is to ensure that each object is accessed correctly and through the implementation of those processes allowed by the stated policies. This research exercise will focus on the utilization of the advantages and disadvantages of access matrix, language-based pr
Continue scrolling to

download full paper
otection, and user authentication as protective mechanisms of the operating system.

Analysis

Language-Based Protection

Language-Based Protection is one of the most effective protection mechanisms in relation to the protection of the operating system with the aim of enhancing and ensuring effective and efficient accessibility of the programs. The main objective of memory management is to offer an effective and convenient abstraction for programming for the purposes of efficiency in the operations of the computer systems. The second objective is to offer quality allocation of the scarce resources among the competing processes with the aim of maximizing the performance of the system under the influence of minimal overhead or operational costs. The development of the systems in the modern society has let to the realization of more powerful, specific, and specialized protection systems and mechanisms in the form of language-based protection (Harrison et al., 2006). One of the most effective and efficient approach towards realization of this kind of protection mechanism is the implementation of the concept of compiler-based enforcement. In the context of compiler-based approach for the protection enforcement, the programmers directly specify the needed protection for diverse resources at the time of the declaration of the resources. It is ideal to note that these limits the accessibility of the operating systems in relation to the development of the modern technologies and computers.

There are various advantages in relation to the implementation and utilization of the language-based protection in the form of compiler-based enforcement. The main advantage of this complex is that the protection needs to utilize only declaration rather than implementation of a series of procedural calls and steps. This makes it easier for utilization and implementation by various users thus enhancing the protection of the system. Another critical advantage relates to the ability of the protection requirements to be stated independently with reference to the support provided by a particular operating system. This is vital for the purposes of effectiveness and efficiency in service delivery. It is also ideal to note that the developer does not need to provide the means of enforcement directly hence beneficial towards operation by the user (Rossbach et al., 2008). Declarative notation is also natural because of the access privileges closely related to the concept of the data types.

Regardless of the enforcement or implementation mechanism, the compiler-based protection utilizes an underlying protection measure under the influence of the operating systems in the form of Hydra systems or Cambridge CAP. It is also essential to note that the compiler-based protection enforcement has the ability to offer valuable protection in the form of treating memory access through different code and data segments. This relates to the utilization of the segments and modification of the codes for the purposes of enhancing protection of the operating systems. This occurs even if the underlying operating system fails in the provision of advanced protection mechanisms. The security of the compiler relates to the integrity of the system (Sharairi 2011). It is also flexible to address the diverse needs and objectives of the user with the aim of offering protection to the operating system. It is also efficient in relation to the benefits with reference to numerous checks off-line known as the compile time rather than during execution.

Despite the overwhelming advantages in relation to the concept of language-based protection, there are also disadvantages towards the implementation of the mechanism in enhancing protection of the operating system. One of the disadvantages relates to the lack of effectiveness or efficiency in the concept of certifying compilation of the protection mechanism. This makes it difficult to denote the standard or quality of effectiveness and efficiency in service delivery. There are also challenges in relation to the security protocols thus affecting utilization or exploitation of the protection mechanism. It is also ideal to note the existence of high assurance in accordance with the concept of downgrading thus affecting exploitation of the language-based protection mechanism with reference to the aspect of the operating system. Another negative implication of the concept of the language-based protection mechanism with reference to the concept of the operating system is the minimization of the trust in accordance with the computing base (Watson 2013). This affects the authenticity and authority of the operating system thus reduced integrity and availability of the data. There is a lack of the security analysis for the purposes of utilizing machine languages in the modern aspects. These negative implications focus on the minimization of the effectiveness and efficiency of the language-based protection mechanism towards enhancing the protection of the operating systems in the modern society.

User Authentication

Authentication refers to the process or mechanism of protection of the operating system through identification of an individual user with the credentials supplied by the OS of the user's computer. The authentication credentials might be in the form of OS password or digital certification in the context of the user's computer system. Authentication is vital in the provision of protection to the operating system and relevant computer programs through exploitation of the authenticity of the systems.

There are various benefits or advantages in relation to the utilization of the user authentication in relation to the provision of protection to the operating system. One of the main benefits or advantages in relation to implementation of this protection mechanism is the opportunity to avoid integration of multiple user names and passwords. The user of the computer system does not have the keep track of multiple user names and passwords in relation to provision of protection to the operating system. It is ideal to note that after a successful login by the user of the operating system, there is no further need to log in with the aim of connecting to other segments of the operating systems. Another benefit is the ability of the user to manage change of passwords in the context of each user's computer or domain level. This is ideal for effectiveness and efficiency in the exploitation of the resources towards protection of the operating system (Cheswick 2013). The user authentication is also critical in enhancing the authenticity of the operating system in relation to the instructions and policies by the relevant developers for maximization of the needs and preferences of the computer users. The main objective of the passwords or user authentication of the operating systems is to limit or manage accessibility of the programs and software for the management of the operations of the computer components. This is vital for enhancing the performance of the operating systems in relation to addressing the needs and preferences of the computer users.

The mechanism is also less expensive in comparison to the implementation of other protection mechanism with the aim of realizing effective protection of the operating system. There is no need to carry extra hardware device in protection of the operating system thus vital for the minimization of cost in realization of the goals and objectives. It is also ideal to note that users of the computer or operating systems do not need to install extra software for the purposes of realizing their goals and objectives. The computer users have the ability and privilege of changing their authentication of choice thus a reflection of expertise in the utilization of the protection mechanism towards realization of the goals and objectives.

Despite the existence of diverse benefits or advantages of user authentication in relation to protection of the operating system, there are numerous negative implications or aspects of the implementation of this mechanism towards the achievement of goals… READ MORE

Quoted Instructions for "Operating System Discuss the Relative Advantages" Assignment:

Discuss the relative advantages and disadvantages of at least three different measures used to protect operating systems.

How to Reference "Operating System Discuss the Relative Advantages" Term Paper in a Bibliography

Operating System Discuss the Relative Advantages.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/operating-system-discuss-relative/7304516. Accessed 1 Jul 2024.

Operating System Discuss the Relative Advantages (2013). Retrieved from https://www.a1-termpaper.com/topics/essay/operating-system-discuss-relative/7304516
A1-TermPaper.com. (2013). Operating System Discuss the Relative Advantages. [online] Available at: https://www.a1-termpaper.com/topics/essay/operating-system-discuss-relative/7304516 [Accessed 1 Jul, 2024].
”Operating System Discuss the Relative Advantages” 2013. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/operating-system-discuss-relative/7304516.
”Operating System Discuss the Relative Advantages” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/operating-system-discuss-relative/7304516.
[1] ”Operating System Discuss the Relative Advantages”, A1-TermPaper.com, 2013. [Online]. Available: https://www.a1-termpaper.com/topics/essay/operating-system-discuss-relative/7304516. [Accessed: 1-Jul-2024].
1. Operating System Discuss the Relative Advantages [Internet]. A1-TermPaper.com. 2013 [cited 1 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/operating-system-discuss-relative/7304516
1. Operating System Discuss the Relative Advantages. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/operating-system-discuss-relative/7304516. Published 2013. Accessed July 1, 2024.

Related Term Papers:

Adoption of New Technology Systems Essay

Paper Icon

Adoption Of New Technology Systems

In planning for the implementation of an Electronic Health Records (EHR) system, it is critically important to have a solid change management strategy in place… read more

Essay 3 pages (951 words) Sources: 3 Topic: Nursing / Doctor / Physician


Drones, Unmanned Aerial Systems (Uav), and Violation of Citizens' Privacy Constitutional Rights Thesis

Paper Icon

Drones unmanned Aerial Systems (UAVs) and violation of citizen's privacy constitutional rights

Drones or Unmanned Aerial Systems (UAVS) 3-9

History of the Unmanned Aerial Systems (UAVS) Technology 4-5

Current Trends… read more

Thesis 40 pages (12745 words) Sources: 25 Topic: Transportation / Mass Transit


Small Computer Systems Term Paper

Paper Icon

Small Computer Systems

Proposed Research Plan: Current and Future Trends in Small, Communicating Computer Systems

The topic or problem to be addressed.

Computers continue to get smaller and the evolution… read more

Term Paper 15 pages (4808 words) Sources: 0 Topic: Computers / IT / Internet


Marketing Response There Are Several Significant Advantages Term Paper

Paper Icon

Marketing

Response

There are several significant advantages of using qualitative measurements in marketing research. The most significant is the ability to capture the voice of customers that may have evaded… read more

Term Paper 8 pages (3792 words) Sources: 3 Topic: Advertising / Marketing / Sales


Hypervisors Analysis of Virtualization Term Paper

Paper Icon

This also leads to greater costs to the enterprise than if they had done nothing before. Another disadvantage that is also very significant for enterprises adopting hypervisors is how difficult… read more

Term Paper 8 pages (2390 words) Sources: 6 Style: APA Topic: Computers / IT / Internet


Mon, Jul 1, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!