Explain about Operating System Security?



Explain about Operating System Security?..

Answer / andy rachman

In Indonesia
=============
SIstem operasi adalah salah satu bagian dari software.
Software sendiri dibagi menjadi 2 bagian :
1. Software System
2. Software Application

Software System terdiri dari Sistem Operasi (bagian paling
bawah),
Compiler, Editor dan Interpreter (pada bagian atas).
Sedangkan Software Application merupakan aplikasi yang
diciptakan untuk
menyelesaikan masalah-masalah yang dimiliki oleh pengguna,
misalnya :
Pemutar Musik MP3 - WInamp, Pembaca file PDF - Acrobat Reader,
Pemutar Film *.MOV - Quick Time, dan lain-lain.

Setiap Sistem Operasi mesti mempunyai keamanan,
Sistem Operas yang paling banyak digunakan saat ini adalah
1. Windows
2. Linux/UNIX

Untuk Windows Sistem Kemanannya tidak sebaik Linux/UNIX, hal
ini disebabkan
karena di WIndows tidak dibedakan kepemilikan file,
sedangkan pada Linux/Unix
kepemilikan file dibedakan.
Pada Linux/UNIX terdapat 3 buah hak akses :
1. Pemilik File
2. Anggota
3. Orang lain.

Sehingga jika kita memiliki file Delphi.pdf pada saat kita
berikan kemanan,
keamanan tersebut hanya dikenakan pada file dan tidak
melihat siapa pemiliknya,
misalnya keamanan yang dipakai adalah diberikan atribut
Hidden. Baik pemilik,
ataupun orang lain tidak akan bisa melihat file tersebut,
hal berlaku pada
sistem operasi WIndows.

Sedangkan pada sistem operasi Linux/UNIX, maka sistem
operasi akan
membedakan hak dari Pemilik, hak dari Anggota dan hak dari
orang lain.
Misal Hak Pemilik RWX (Read Write Execute), Hak Anggota
(R-X) dan
Hak orang lain (--X), maka Pemilik file bisa melakukan
pembacaan file,
bisa mengubah file dan bisa menyimpan hasil perubahan
tersebut, sedangkan
Hak Anggota hanya bisa membaca dan mengeksekusinya saja,
sedangkan
Hak Orang Lain hanya bisa mengeksekusi aplikasi yang
menempel padanya,
dalam hal ini *.pdf reader.

In English :

The operating system is part of the software.
Software is divided into 2 parts:
1. Software System
2. Software Application

System software consists of Operating System (at bottom),
Compiler, Editor and Interpreter (on top).
While the Software Application is an application that was
created for solve the problems which are owned by the user,
for example:
A. MP3 Music Player - Winamp,
B. Reader PDF file - Acrobat Reader,
C.Movie Player *. MOV - QuickTime, etc.

Each operating system has security system,
The operating system most used today is
1. Windows
2. Linux / UNIX

For Windows Security System not as good as Linux / UNIX,
this is due to because in Windows do not distinguish the
ownership of a file, whereas on Linux / Unix ownership of
files are distinguished.
On Linux / UNIX there are 3 pieces of access rights:
1. Owner Files
2. Members
3. Others.

So if we have a file Delphi.pdf when we give security,
security only applies to files and did not see who the
owner, security that is used is given Hidden attribute. Both
the owner, or another person will not be able to view the
file, it applies to Windows operating system.

While on the operating system Linux / UNIX, the operating
system will distinguish the rights of owners, the rights of
Members and the rights of others.
A. Rights Owner RWX (Read Write Execute),
B. Members has user right (R-X) and
C. The Other has (--X),

it's mean that the owner of the file can do the reading
file, change the file and save changes, whereas
Rights of Members can only read and execute only, whereas
Rights of Others can only execute applications that are
attached to it, in this case *. pdf reader.

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More Operating Systems General Concepts Interview Questions

What is run level 1?

0 Answers  


Is 32gb of ram overkill?

0 Answers  


What do you mean by Belady's Anomaly. - Describe with example.

4 Answers   IBM,


Why is interrupt vector used in operating systems?

0 Answers  


Who does the memory management in operating system?

0 Answers  






What are the thread states?

0 Answers  


Does deleting all files uninstall a program?

0 Answers  


Will chkdsk fix bad sectors?

0 Answers  


What are numerous ways in which a thread can enter the waiting state?

0 Answers  


What are the three types of operating systems?

0 Answers  


What is context-switching in multi-threading?

0 Answers  


How many registers does x86 have?

0 Answers  


Categories