Systems software and security

Description

Mind Map on Systems software and security, created by Sam Houghton on 11/01/2017.
Sam Houghton
Mind Map by Sam Houghton, updated more than 1 year ago
Sam Houghton
Created by Sam Houghton almost 8 years ago
26
1

Resource summary

Systems software and security
  1. Operating system software
    1. Some operating systems
      1. Android OS Versions have nicknames such as Jelly Bean and Kit Kat OS X (Apple MACs) Versions have nicknames such as “Mountain Lion” and “Snow Leopard” iOS (iPhone/iPad) MS-DOS and Windows Google Chrome OS (based on Linux) Linux
      2. Functions of an operating system
        1. Provides a user interface
          1. Manages
            1. memory --- multitasking --- peripherals --- files --- user access rights
          2. User Interface
            1. Without a user interface we would have to communicate in binary! The user interface for a device has to suit how it is used....
            2. Types of User Interface
              1. GUI: Graphical User Interface
                1. WIMP: Windows, Icons, Menus and Pointers
                  1. User can click on icons using a pointer or cursor Icons representing functions mean less need to type instructions – just click on an icon or menu item Right-clicking brings up context-sensitive menus Different shaped pointers have different uses
                  2. Menu-driven interface
                    1. CLI: Command Line Interface
                      1. All user commands must be typed in as text No graphics Quicker for expert users who know the commands Takes less space on the disk and in RAM
                      2. Voice activated
                        1. Real-time
                        2. To run a program, the computer must copy the program from storage into main memory
                          1. The operating system keeps a record of where each program and its data are located It must not overwrite existing programs
                          2. Multi-tasking
                            1. There are many background processes running on the computer as well
                              1. They are taking it in turns to get processor time to execute instructions The OS must manage how the processes share the processor
                          3. Utility software
                            1. encryption software
                              1. Encryption software is used to transform text so that it cannot be read without knowing the key to decode it
                                1. Encryption tools : Uses
                                  1. Encrypt files and folders on a portable disk such as a USB memory stick
                                    1. Encrypt web communication
                                      1. Encrypt data on an organisation’s database
                                    2. defragmentation software
                                      1. Disk defragmentation
                                        1. When you save a large file it may not fit on the disk in consecutive memory locations
                                          1. The file is referred to as “fragmented” Retrieving data from the file takes more processing More processing means reduced performance
                                            1. Defragmenting the hard disk reorganises files so they are stored together Processing time reduces so performance is improved Free space is also in one place so new files do not have to be fragmented
                                        2. data compression software
                                          1. Utilities such as WinZip enables users to compress and decompress files or folders
                                            1. Reduces bandwidth usage and data consumption to download and send a compressed file Can enable file sizes to fit with strict email attachment or ISP limits Increases the amount of data that can be stored or archived on disk
                                          2. What are utilities?
                                            1. The operating system controls and manages the computer system
                                              1. Utilities provide extra functionality that make it easier to use
                                                1. They can be packaged as part of the operating system or bought as stand-alone software programs
                                                2. File management and transfer
                                                  1. Think of the tools we use for managing our files We can move, copy and delete folders and files
                                                  2. Backup utilities
                                                    1. You need to back up data on your hard disk – why?
                                                      1. Windows has a Backup and Restore utility which will create a backup of your files on a regular schedule
                                                        1. You need to save the backed up data onto an external hard drive
                                                          1. Organisations from the smallest companies to the largest banks, cannot afford to lose any data
                                                            1. Commercial backup utilities make sure that even in the event of fire or flood, all data can be recovered
                                                      2. Backup and recovery
                                                        1. Backing up files is vital to protect against loss from accidental or malicious damage, corruption or natural disaster
                                                          1. Companies and individuals should adopt a routine backup strategy to insure against any losses
                                                            1. Backup methods
                                                              1. Full backup
                                                                1. Complete backup of everything which can be restored independently of any other backup Takes greater time and disk space to create the backup
                                                                2. Incremental backup
                                                                  1. Records only the changes made since the last backup A entire chain of backups is required to fully restore files
                                                      3. Network threats
                                                        1. Identifying and preventing vulnerabilities
                                                          Show full summary Hide full summary

                                                          Similar

                                                          Tectonic Hazards flashcards
                                                          katiehumphrey
                                                          Physics equations
                                                          helensellers75
                                                          Macbeth quotes
                                                          Daniel Cormack
                                                          Psychology A1
                                                          Ellie Hughes
                                                          GCSE AQA Chemistry - Unit 1
                                                          James Jolliffe
                                                          The Rise of the Nazis
                                                          shann.w
                                                          Grammar Rules
                                                          Sandra Yeadon
                                                          Leaving Cert Poetry 2017
                                                          Mark O'M
                                                          An Inspector Calls - Quotes and Context
                                                          James Holder
                                                          GCSE Computer Science (AQA)
                                                          Wolfie Ruth
                                                          ASSD & PSBD QUESTION 2018 200
                                                          Dhiraj Tamang