Zusammenfassung der Ressource
Systems software and security
- Operating system software
- Some operating systems
- Android OS Versions have nicknames such as Jelly Bean and Kit Kat OS X (Apple MACs) Versions have
nicknames such as “Mountain Lion” and “Snow Leopard” iOS (iPhone/iPad) MS-DOS and Windows
Google Chrome OS (based on Linux) Linux
- Functions of an operating system
- Provides a user interface
- Manages
- memory --- multitasking --- peripherals --- files --- user access rights
- User Interface
- Without a user interface we would have to
communicate in binary! The user interface for
a device has to suit how it is used....
- Types of User Interface
- GUI: Graphical User Interface
- WIMP: Windows, Icons,
Menus and Pointers
- User can click on icons using a pointer or cursor Icons representing functions mean
less need to type instructions – just click on an icon or menu item Right-clicking
brings up context-sensitive menus Different shaped pointers have different uses
- Menu-driven interface
- CLI: Command Line Interface
- All user commands must be typed in as text No graphics Quicker for expert
users who know the commands Takes less space on the disk and in RAM
- Voice activated
- Real-time
- To run a program, the computer must copy
the program from storage into main memory
- The operating system keeps a record of where each
program and its data are located It must not overwrite
existing programs
- Multi-tasking
- There are many background processes running on the computer as well
- They are taking it in turns to get processor time to execute instructions The OS must manage how
the processes share the processor
- Utility software
- encryption software
- Encryption software is used to transform text so that it cannot be read without knowing the key to
decode it
- Encryption tools : Uses
- Encrypt files and folders on a portable
disk such as a USB memory stick
- Encrypt web communication
- Encrypt data on an organisation’s database
- defragmentation software
- Disk defragmentation
- When you save a large file it may not fit on the disk in
consecutive memory locations
- The file is referred to as “fragmented” Retrieving data from
the file takes more processing More processing means
reduced performance
- Defragmenting the hard disk reorganises files so they
are stored together Processing time reduces so
performance is improved Free space is also in one
place so new files do not have to be fragmented
- data compression
software
- Utilities such as WinZip enables users to
compress and decompress files or folders
- Reduces bandwidth usage and data
consumption to download and send a
compressed file Can enable file sizes
to fit with strict email attachment or
ISP limits Increases the amount of
data that can be stored or archived
on disk
- What are utilities?
- The operating system controls and manages the computer system
- Utilities provide extra functionality that make it easier to use
- They can be packaged as part of the operating system or bought as stand-alone software programs
- File management and transfer
- Think of the tools we use for
managing our files We can
move, copy and delete folders
and files
- Backup utilities
- You need to back up data on your hard disk – why?
- Windows has a Backup and Restore utility which will create
a backup of your files on a regular schedule
- You need to save the backed up data onto an external
hard drive
- Organisations from the smallest companies to the largest
banks, cannot afford to lose any data
- Commercial backup utilities make sure that even in the event
of fire or flood, all data can be recovered
- Backup and recovery
- Backing up files is vital to protect against loss from
accidental or malicious damage, corruption or natural
disaster
- Companies and individuals should adopt a routine backup
strategy to insure against any losses
- Backup methods
- Full backup
- Complete backup of everything which can be
restored independently of any other backup
Takes greater time and disk space to create the
backup
- Incremental backup
- Records only the changes made since
the last backup A entire chain of
backups is required to fully restore files
- Network threats
- Identifying and preventing vulnerabilities