Explain about Operating System Security?



Explain about Operating System Security?..

Answer / andy rachman

In Indonesia
=============
SIstem operasi adalah salah satu bagian dari software.
Software sendiri dibagi menjadi 2 bagian :
1. Software System
2. Software Application

Software System terdiri dari Sistem Operasi (bagian paling
bawah),
Compiler, Editor dan Interpreter (pada bagian atas).
Sedangkan Software Application merupakan aplikasi yang
diciptakan untuk
menyelesaikan masalah-masalah yang dimiliki oleh pengguna,
misalnya :
Pemutar Musik MP3 - WInamp, Pembaca file PDF - Acrobat Reader,
Pemutar Film *.MOV - Quick Time, dan lain-lain.

Setiap Sistem Operasi mesti mempunyai keamanan,
Sistem Operas yang paling banyak digunakan saat ini adalah
1. Windows
2. Linux/UNIX

Untuk Windows Sistem Kemanannya tidak sebaik Linux/UNIX, hal
ini disebabkan
karena di WIndows tidak dibedakan kepemilikan file,
sedangkan pada Linux/Unix
kepemilikan file dibedakan.
Pada Linux/UNIX terdapat 3 buah hak akses :
1. Pemilik File
2. Anggota
3. Orang lain.

Sehingga jika kita memiliki file Delphi.pdf pada saat kita
berikan kemanan,
keamanan tersebut hanya dikenakan pada file dan tidak
melihat siapa pemiliknya,
misalnya keamanan yang dipakai adalah diberikan atribut
Hidden. Baik pemilik,
ataupun orang lain tidak akan bisa melihat file tersebut,
hal berlaku pada
sistem operasi WIndows.

Sedangkan pada sistem operasi Linux/UNIX, maka sistem
operasi akan
membedakan hak dari Pemilik, hak dari Anggota dan hak dari
orang lain.
Misal Hak Pemilik RWX (Read Write Execute), Hak Anggota
(R-X) dan
Hak orang lain (--X), maka Pemilik file bisa melakukan
pembacaan file,
bisa mengubah file dan bisa menyimpan hasil perubahan
tersebut, sedangkan
Hak Anggota hanya bisa membaca dan mengeksekusinya saja,
sedangkan
Hak Orang Lain hanya bisa mengeksekusi aplikasi yang
menempel padanya,
dalam hal ini *.pdf reader.

In English :

The operating system is part of the software.
Software is divided into 2 parts:
1. Software System
2. Software Application

System software consists of Operating System (at bottom),
Compiler, Editor and Interpreter (on top).
While the Software Application is an application that was
created for solve the problems which are owned by the user,
for example:
A. MP3 Music Player - Winamp,
B. Reader PDF file - Acrobat Reader,
C.Movie Player *. MOV - QuickTime, etc.

Each operating system has security system,
The operating system most used today is
1. Windows
2. Linux / UNIX

For Windows Security System not as good as Linux / UNIX,
this is due to because in Windows do not distinguish the
ownership of a file, whereas on Linux / Unix ownership of
files are distinguished.
On Linux / UNIX there are 3 pieces of access rights:
1. Owner Files
2. Members
3. Others.

So if we have a file Delphi.pdf when we give security,
security only applies to files and did not see who the
owner, security that is used is given Hidden attribute. Both
the owner, or another person will not be able to view the
file, it applies to Windows operating system.

While on the operating system Linux / UNIX, the operating
system will distinguish the rights of owners, the rights of
Members and the rights of others.
A. Rights Owner RWX (Read Write Execute),
B. Members has user right (R-X) and
C. The Other has (--X),

it's mean that the owner of the file can do the reading
file, change the file and save changes, whereas
Rights of Members can only read and execute only, whereas
Rights of Others can only execute applications that are
attached to it, in this case *. pdf reader.

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More Operating Systems General Concepts Interview Questions

Explain what is meant by repetition of information and inability to represent information. Explain why each of these properties may indicate a bad relational database design.

0 Answers  


What is feram?

0 Answers  


What is difference in managing processes in windows, unix, RTOS?

0 Answers   HP,


What resources are used when a thread created?

0 Answers  


What do you understand by coding schemes?

0 Answers  






Does chkdsk delete files?

0 Answers  


Can you have both 32 bit and 64 bit excel?

0 Answers  


What are the four common types of files?

0 Answers  


Can you list the coffman's conditions that lead to a deadlock?

0 Answers  


How many bit is my computer?

0 Answers  


State the advantages of segmented paging over pure segmentation?

0 Answers  


Differentiate between RAM and ROM?

8 Answers   DELL, Polytechnic Ibadan,


Categories