StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advantages and disadvantages of measures use to protect operating system - Research Paper Example

Cite this document
Summary
Information technology is one of the most important fields in computer science. Basically, operating system is the system software. Software supports the basic functions of a computer…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Advantages and disadvantages of measures use to protect operating system
Read Text Preview

Extract of sample "Advantages and disadvantages of measures use to protect operating system"

?Running head: Advantages and disadvantages of measures use to protect operating system Introduction Information technology isone of the most important fields in computer science. Basically, operating system is the system software. Software supports the basic functions of a computer. Operating system consists of data and programs that manages and run the computer hardware and provide common services for the execution of application efficiently. Operating system being a program is frequently attacked by viruses and therefore need protection so as to effectively and efficiently operate. There are several measures that are used to protect the operating system. However, the measures have certain disadvantages and disadvantages. This leads to differential in efficiency of measures used to protect the operating system. This paper discusses different measures used to protect the operating system and the advantages and disadvantages of each. It basically concentrates on three measures. Furthermore, it discusses ease of implementation and associated security management issues that need to be addressed. It also ranks the measures used to protect the operating system from the most effective to the least effective. Measures used to protect the operating system There are several measures that are used to protect the operating system. These are meant to deny unauthorized access to the system. They include use of strong password, protection of confidential information, making sure that the operating system and the virus protection are updated. It may also be use of supported and secure applications, wary of suspicious e-mails, storing of confidential information in HSU servers only, data should be provided wit a back up and it should be easily restored. Protection of information in all forms, learning security awareness and inquiring on matters that are not clear or certain. Measures used in protecting the operating system are aimed at protecting information from theft, natural disaster or corruption. It also ensures that information is only accessed by the authorized users. It also protects the operating system from collapse that may be caused by unauthorized persons. There are several measures that are used in protection of operating system as discussed above. However, the paper will focus on three measures only. They are use of a strong password, updating the operating system and the virus protection and data back up and ensuring they can be easily restored (Tatnall, Osorio, and Visscher, 2005, p 67). Use of strong password Operating systems are in most cases protected through passwords by most users. This is because this is one of the cheapest and easiest ways of protecting the operating system. Password may be in form of letters or numbers that are specifically known and recognized by the individual user. Furthermore, a password has to be unique to the user and unknown to unauthorized users. This ensures that unauthorized persons do not access data that they are not allowed to access by the respective persons. Password is widely used to protect the operating system by most users. However, it has both disadvantages and advantages (Meghanathan, 2011, p 79). Advantages of use of strong password (1) Guessing possibility; generally guessing a password is one of the most difficult things. This is because passwords are not usually displayed when entered. Passwords may be made long or short depending on the ability of the user to remember the password. This makes password difficult to guess and access the information without knowledge of the authorized user (Kim, and Adeli, 2010, pp 56-96). (2) Simple; passwords are simple and easy to generate. This is because anything may be used as password provided it falls within the accepted number of letters accepted by the system or that can be easily remembered by the user. Password may be words or letters or both. Furthermore, password may be in either upper case or lower case depending on the preference of the user (Kim, and Adeli, 2010, pp 56-96). (3) Accuracy; password is accurate considering that it is definite and cannot be easily manipulated. Password is unique to a log in different areas or system access. That is the set password has to be entered by the user so as to access the system or program (Kim, and Adeli, 2010, pp 56-96). (4) Reliability; passwords are reliable because they are developed by the user himself and only him or her can change that. Passwords are also easy to change and protect from unauthorized persons (Kim, and Adeli, 2010, pp 56-96). (5) Cost effective; this measure is cost effective because it does not require any fee or cost to administer. Passwords are set free of charge and may be changed at any time depending on the need of the holder or system user (Kim, and Adeli, 2010, pp 56-96). (6) Time conscious; password is time conscious because it is set at any time and changed at any time too. The process of setting a password or resetting it does not take long and therefore, consumes less time of the user (Kim, and Adeli, 2010, pp 56-96). Disadvantages of password (1) Can be easily forgotten; password may be easily forgotten especially if one uses different passwords to access different applications (Kim, and Adeli, 2010, pp 56-96). (2) Ineffective; password may be ineffective if used by more than one user. This is because it can easily be accessed by other users or leaked to unauthorized users by the other multiple users (Kim, and Adeli, 2010, pp 56-96). (3) Time consuming; it may be time consuming especially when forgotten hence may require the retrieval process which is more complex and might take more time of the users (Kim, and Adeli, 2010, pp 56-96). Upgrading of operating system and virus protection The operating system is dynamic and therefore changes with time and advancement in technology. This has led to the development of several and different operating system or programs. This requires individual users to frequently up date their system and promote effective operation of the system. Secondly, virus is a threat to the operating system and may break of slow operations. Therefore, virus protection has to be up dated. This is because viruses are advanced and hence requires advanced protection to adequately protect the operating system from threats and loss of information. Information may easily be lost from the operating system if it is attacked by a virus. Therefore, operating system ought to be up dated to ensure effective operation. Secondly, virus protection should be up dated too to ensure the information is protected from loss that may be caused by virus attack. This measure is effective and ensures the operating system is protected. However, there are certain disadvantages despite the advantages the measure possess (Tomar, 2010, p 109). Advantages of operating system and virus protection up date (1) Reliable; this process is reliable because it ensures that the whole system is safe from any other attack. This is because it ensures that the system is safe from virus which in most cases leads to loss of information by most users and subscribers (Tomar, 2010, p 109). (2) Promotes efficiency; when operating system is up dated, efficiency is promoted. This is because up dated operating system conforms to the current system and increases out put of the respective system. This ensures the system is accurate to the requirement of users (Tomar, 2010, p 109). (3) Accurate; this measure is accurate because operating system is dynamic and changes regularly. Secondly, system virus also evolves and requires up to date protection to protect the system from attack that may lead to loss of information (Tomar, 2010, p 102). (4) Time conserving; this measures serves time that may be spent taking the system for repair among others. The measure protects the system from attack hence minimizes chances of the system undergoing maintenance or repair processes (Tomar, 2010, p 102). Disadvantages of operating system and virus protection (1) Expensive; up dating of the operating system and the protection for virus is expensive. This is because it has to be continuous considering virus and operating system are dynamic and changes with changes in different factors in the operating system (Tomar, 2010, p 103). (2) Complicated; this measure is faced with complication issues. This is because there are different types of virus protections that are developed hence determination of the most appropriate one is difficult (Tomar, 2010, p 103). Data back up and ensuring they are accessible Operating system may use memory to store information. However, the memory may be limited and require additional source to store the information. Back up memory assists in storage of extra data that could not be stored by the original data storage capacity of the system. This ensures that important data are safely stored. Accessibility of the data also ensures that the data stored in external sources are not lost (Tomar, 2010, p 107). Advantages of data back up (1) Memory expansion; basically, back up storage sources increase the storage volume of the operating system. This increases the capability of the operating system to store more information without threat of data congestion and any risks that may be associated to it (Tomar, 2010, p 109). (2) Saves space; back up storage basically saves space that might be used to run another operating system. This is because memory back up is small in size while operating system is large or big (Tomar, 2010, p 109). Disadvantages of data back up (1) External or back up data storage medium are expensive. This measure is effective because it reduces memory congestion, but it is expensive to purchase or obtain an appropriate back up (Berdtsson, 2008, p 123). These measures are effective in ensuring safety of the operating system. However, the decree of effectiveness differs depending on the advantages and disadvantages of each measure. Furthermore, ease of their implementation also differs, for instance, use of password is basically preferred by most users hence easily implemented. Secondly, data back up may be preferred to up date of the operating system due to cost differentials. Generally, up dating of the operating system and the virus protection is the least likely measure to be considered by most users. This is due to its cost (Reilly, 2003, p 107). Moreover, effectiveness of these measures differs in effectiveness and efficiency. Among the three measures, the best measure is up date of the system and protection virus. This is because the measure addresses all the aspects of the system at once and reduces time wastage that may arise due to need for maintenance and repair. Secondly, password is preferable because it is cheap and widely used by most users. This increases reliability of the measure. However, back up data may be assumed to be the worst among these measures discussed. This is because it only reduces stain caused by data congestion (National Research council, 2003, p 123). References Reilly, E. (2003). Milestones in computer science and information technology. London: Greenwood Publishing Group. Tomar, G. (2010). Advanced computer science and information technology. New York: Springer. Kim, T and Adeli, H. (2010). Advances in computer science and information technology. New York: Springer. Meghanathan, N. (2011). Advances in computer science and information technology. New York: Springer. Tatnall, A, Osorio, J and Visscher, A. (2005). Information technology and educational Management in the knowledge society. Chicago: Springer. Berdtsson, M. (2008). Thesis projects in computer science and information systems. Chicago: Springer. National Research council, (2003). Innovation in information technology. Washington: National Academies Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Advantages and disadvantages of measures use to protect operating Research Paper”, n.d.)
Retrieved de https://studentshare.org/information-technology/1392008-advantages-and-disadvantages-of-at-least-three
(Advantages and Disadvantages of Measures Use to Protect Operating Research Paper)
https://studentshare.org/information-technology/1392008-advantages-and-disadvantages-of-at-least-three.
“Advantages and Disadvantages of Measures Use to Protect Operating Research Paper”, n.d. https://studentshare.org/information-technology/1392008-advantages-and-disadvantages-of-at-least-three.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advantages and disadvantages of measures use to protect operating system

Protecting Operating Systems, Security Vulnerabilities

In this essay, we are going to discuss by analyzing three common ways of preventing operating system attacks or violations concerning their ease of application, their associated management issues, and thereafter rank them in order of their effectiveness.... The paper "Protecting Operating Systems, Security Vulnerabilities" highlights that different classifications of system criticality define what security measure best caters to a specific security need....
8 Pages (2000 words) Essay

Project Management vs Operations Management

The assignment "Project Management vs Operations Management" describes the strengths and limitations of project management compared with operations management.... Operations management has three characteristics: Creates goods and services; Transforms inputs into outputs; Focuses on operations.... hellip; Project management is an activity with a specific objective, finite duration (start & end dates), and limited resources (money, people, material)....
5 Pages (1250 words) Assignment

Management accounting

The comparative advantages and disadvantages of accumulation and allocation of costs of galleries under traditional and activity based costing approaches have been discussed in depth, in order to reach at an optimum solution.... Activate based costing (ABC) is different as here costs are first accumulated for each of gallery activities and then those costs are assigned on the basis of appropriate measures (cost drivers) and their effects to exhibitions, seminars, and other activities of the museum....
4 Pages (1000 words) Essay

Outsourcing for IT and Software Development Industry

The trend of… And companies are gaining competitive advantages and saving their resources by outsourcing their needs.... This paper also discusses about the insourcing and its comparison with the outsourcing.... I have selected IT industry for explaining the preference of outsourcing and insourcing....
13 Pages (3250 words) Essay

Advantages and Disadvantages of a Monopoly

Different market structures resulting from different market… This study aims at analyzing the advantages and disadvantages of monopolies as a form of market structure in the economy.... Microsoft ownership of the windows operating system brand is an example when monopoly results from the ownership of a scarce resource in the economy.... Examples of monopoly include Feet-First Pharmaceutical and power supply firm in a country where there is only one operating license provided by the government....
8 Pages (2000 words) Term Paper

Operations Management and Strategy of Apple Inc

Nevertheless, not only because of its roots but also because of the area, it covers, and the knowledge and the skills gained from the study.... This report reviews on operations management… Apple Inc defines a US global firm that designs, manufactures and markets mobile communication devices and media devices....
8 Pages (2000 words) Coursework

Construction Economics and Procurement Methods

The report, addressing the Oldcross Borough Council, will explain the basics of “Design-Build Finance and Operate” for public project procurement as well as its advantages and disadvantages.... In this report "Construction Economics and Procurement Methods" the construction sector is considered as the provision of materials, products, and professional services related to construction as well as the construction contracting industry....
8 Pages (2000 words) Case Study

Advantages and Disadvantages of Hacking

There are various forms of advantages and disadvantages of hacking (Engebretson, 2013 p.... Likewise, the organization can protect its computer system from attack by understanding how to attack it themselves.... However, there are numerous disadvantages that can be associated with hacking a system.... Secondly, criminals may be at will to use it to benefit their criminal activities.... Thus, hackers can assist institutions to determine which of their computer security measures is more effective, the ones that need updating, and the ones that pose a little deterrent to harmful intruders....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us