Sam Houghton
Mind Map by , created more than 1 year ago

Mind Map on Systems software and security, created by Sam Houghton on 11/01/2017.

26
1
1
Sam Houghton
Created by Sam Houghton almost 8 years ago
Rate this resource by clicking on the stars below:
1 2 3 4 5 (1)
Ratings (1)
1
0
0
0
0

1 comment

almost 8 years ago
10/10 ign gr8 m8 i r8
Close
Systems software and securityOperating system softwareUtility softwareNetwork threatsIdentifying and preventing vulnerabilitiesencryption softwaredefragmentation softwaredata compressionsoftwareWhat are utilities?The operating system controls and manages the computersystemUtilities provide extra functionality that make it easier touseThey can be packaged as part of the operating system or bought as stand-alone softwareprogramsEncryption software is used to transform text so that it cannot be read without knowing the keyto decode itEncryption tools :UsesEncrypt files and folders on a portabledisk such as a USB memory stickEncrypt web communicationEncrypt data on an organisation’sdatabaseFile management andtransferThink of the tools we use formanaging our files We canmove, copy and delete foldersand filesDisk defragmentationWhen you save a large file it may not fit on the disk inconsecutive memory locationsThe file is referred to as “fragmented” Retrieving datafrom the file takes more processing More processingmeans reduced performanceDefragmenting the hard disk reorganises files so theyare stored together Processing time reduces soperformance is improved Free space is also in oneplace so new files do not have to be fragmentedBackup utilitiesYou need to back up data on your hard disk –why?Windows has a Backup and Restore utility which willcreate a backup of your files on a regular scheduleYou need to save the backed up data onto anexternal hard driveOrganisations from the smallest companies to the largestbanks, cannot afford to lose any dataCommercial backup utilities make sure that even in theevent of fire or flood, all data can be recoveredBackup andrecoveryBacking up files is vital to protect against loss from accidentalor malicious damage, corruption or natural disasterCompanies and individuals should adopt a routine backupstrategy to insure against any lossesBackup methodsFull backupIncremental backupComplete backup of everything which can berestored independently of any other backupTakes greater time and disk space to createthe backupRecords only the changes made sincethe last backup A entire chain ofbackups is required to fully restore filesUtilities such as WinZip enables users tocompress and decompress files orfoldersReduces bandwidth usage and dataconsumption to download and send acompressed file Can enable file sizesto fit with strict email attachment orISP limits Increases the amount ofdata that can be stored or archivedon diskSome operating systemsAndroid OS Versions have nicknames such as Jelly Bean and Kit Kat OS X (Apple MACs) Versions havenicknames such as “Mountain Lion” and “Snow Leopard” iOS (iPhone/iPad) MS-DOS and WindowsGoogle Chrome OS (based on Linux) LinuxFunctions of an operating systemProvides a user interfaceManagesmemory --- multitasking --- peripherals --- files --- user access rightsUser InterfaceWithout a user interface we would have tocommunicate in binary! The user interface fora device has to suit how it is used....Types of User InterfaceGUI: Graphical User InterfaceWIMP: Windows, Icons,Menus and PointersMenu-driven interfaceCLI: Command Line InterfaceVoice activatedReal-timeUser can click on icons using a pointer or cursor Icons representing functions meanless need to type instructions – just click on an icon or menu item Right-clickingbrings up context-sensitive menus Different shaped pointers have different usesAll user commands must be typed in as text No graphics Quicker for expertusers who know the commands Takes less space on the disk and in RAMTo run a program, the computer must copythe program from storage into main memoryThe operating system keeps a record of where eachprogram and its data are located It must not overwriteexisting programsMulti-taskingThere are many background processes running on the computer as wellThey are taking it in turns to get processor time to execute instructions The OS must manage howthe processes share the processorDouble click this nodeto edit the textClick and drag this buttonto create a new node