StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Operating Systems and Security - Report Example

Cite this document
Summary
This report "Operating Systems and Security" presents the security systems for the two file systems that are more or less similar to minor differences. The permission and access control differ with the ext3 advancing an owner and owner group system and NTFS adapting an access control…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Operating Systems and Security
Read Text Preview

Extract of sample "Operating Systems and Security"

Topic: Operating systems and security Pre-brief 26th February Shell Program 1. Introduction The command interpreter, Shell, provides UNIX users with an interface to the kernel. This Command Line interpreter (CLI) interprets the commands a user types in and tries to arrange them in order of how they will be executed. It also allows for the users to code an interpretive script and group these together using simple programming constructs such as ‘while’, ‘if’, while and ‘for’. A shell script is written to and executed as a single command. This piece of work will dwell on writing a simple menu driven scenario. Information that the program will show include List of users who are logged in Present handling directory Show the content of ‘etc’ directory. 1.2. Source code /* Ali Baba, SID: 000001, ....SE CW1, BSc etc. */ !/bin/bash # # A menu driven Shell script which has following options # List of all Processes running on your Linux machine # List of users currently logged # Present handling directory # List disk space/ System Health # Show Content of /etc directory # Backup current Directory files # List content of files backed up!! # Exit # As per option do the job # -------------------------------------------------------------- # Student ID: # Name: # Course: # -------------------------------------------------------------- while : do clear echo " M A I N - M E N U" echo "1. List of all Processes running on your machine" echo "2. List of users currently logged" echo "3. Present handling directory" echo "4. List disk space/ System Health" echo "5. Show Content of /var/lib directory" echo "6. Backup current Directory files" echo "7. List content of files backed up!!" echo "8. Exit" echo -n "Please select option between [1 - 8] then press [enter] Key:" read opt case $opt in 1) echo "************ List of all Processes running *************"; ps aux | less;; 2) echo "*********** List of users currently logged"; who | more /etc/passwd;; 3) echo "You are in $(pwd) directory"; echo "Press [enter] key to continue. . ."; read enterKey;; 4) echo "*********************Checking Disk space*****************"; df -h; echo "Press [enter] key to continue. . ."; read enterKey;; 5) echo "*********************Show Content of /var/lib*****************"; ls -all /var/lib; echo "Press [enter] key to continue. . ."; read enterKey;; 6) echo "*********************Backing up current directory files*****************"; rm -rf /home/user/Desktop/bakup; mkdir /home/user/Desktop/bakup; cp -rf $2 $(pwd)/home/user/Documents/ /home/user/Desktop/bakup; echo "File has been backup on $(pwd)/backup" echo " Press [enter] key to continue. . ."; read enterKey;; 7) echo "************ Content of files backed up *************"; ls -altr /home/user/Desktop/bakup/; echo "Press [enter] key to continue. . ."; read enterKey;; 8) echo "Bye $USER"; exit 1;; *) echo "$opt is an invaild option. Please select option between 1-8 only"; echo "Press [enter] key to continue. . ."; read enterKey;; esac done      Output Screenshots: Figure 1: Main Menu: list the options available from 1 -8 Figure 2: List of processes running on the machine Figure 3: Users logged on: user tty1 & pts/0 logged on and time of logging Figure 4: Present handling directory: /home/user/Desktop Figure 5:Disk space and system health Figure 6: Content of the /var/lib/ directory Figure 7: List content of files backed up Figure 8: Exit the shell script 1.3. Conclusion I have in this exercise being able to write a simple shell script for checking the users who are logged in, system health and the disk space. The program can also, through an option which the author select from 1-8 able to display the content of the ‘var/lib’ directory. Part Two: a C program 2.1. Introduction C is programming language which is a high level language in implemented in UNIX OS. A source code is written which is then followed by a compilation process where the compiler translates it into an object code. Object code entails a code language of machine instructions which the computer can execute. 2.2. Source Code /* Ali Baba, SID: 000001, ....SE CW1, BSc etc. */ #include #include #include main() { char string[100], ch; int s = 0, count[26] = {0}; printf("Enter a string\n"); gets(string); if(string[s]>=48 && string[s]=65 && string[s]= a && string[s] =A && string[x]=a && string[x] Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Operating Systems and Security Report Example | Topics and Well Written Essays - 1250 words, n.d.)
Operating Systems and Security Report Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1766751-operating-systems-and-security
(Operating Systems and Security Report Example | Topics and Well Written Essays - 1250 Words)
Operating Systems and Security Report Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1766751-operating-systems-and-security.
“Operating Systems and Security Report Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1766751-operating-systems-and-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Operating Systems and Security

An IT security consultant

An IT security Consultant Name: Institution: An IT security Consultant A vulnerability could be a flaw, error or weakness in an Information Technology (IT) system which an attacker may exploit and alter the system's normal behavior (Christey 2007).... hellip; Considering the exposure of most systems to multiple users through the internet, and environments such as the operating system, the vulnerability to attack increases, with unpredictable consequences in costs and damages (Zellan 2003)....
3 Pages (750 words) Essay

Information System: SirsiDynix

SirsiDynix has worked on almost all types of library systems which include government, public, and academic (Vista Equity Partners, 2013).... T operating system provides a powerful operating system to the library's system allowing it to resist any foreign attacks on the system....
9 Pages (2250 words) Case Study

Elements of Security System

Major company reorganization occurs with both economic pressure and security risks.... This paper explains the reason and how security strategy as a key element might require being updated as a perfect way of addressing security risks associated with various business environment.... hellip; When migrating to an email system that is cloud-based, updating security strategy would be important to avoid possible risks associated with the increase concern on hosted email services due to the associated benefits....
1 Pages (250 words) Coursework

ESD ( Emergency shout down) tool (chemical engneering)

In addition, ABB provides a broad family of industry-specific libraries that contain Control Modules, Function Blocks, Data Types and graphic elements including special safety systems features for ESD applications1.... Emergency Shutdown Tools (ESD) are primarily designed to minimize casualties in an event of emergency, these casualties may vary in nature, from unexpected system flooding, escaping poisonous gases or fire outbreak in areas containing hydrocarbons or any other material that is… Traditionally, they are used in high safety levels, often SIL 2 and 3. The system is made up of an array of sensors capable to detect different incoming signals, alarm system, valves, relays and logic processing units, which in With all the components functioning properly, ESD can process an incoming input from the sensors and sends an output signal to initiate a response that handles the emergency....
4 Pages (1000 words) Essay

Advantages of Distributed Operating Systems

Evidence however shows that this is particularly a challenging concept since as these systems attempt to enhance performance; they actually end up conflicting with other properties, especially the reliability and security of the system.... These… The process of developing and using distributed systems actually erodes these benefits. First, evidence shows that distributed operating systems pose major security risks to the system.... This is because Distributed operating systems Assignment Although distributed operating system have been said to enable the implementation of powerful resource-sharing schemes, enhance performance, increase reliability and ensure better communication, evidence shows that these systems to do not actually offer all these benefits....
2 Pages (500 words) Assignment

Best Practice for OS, FW, and SELinux

This assignment "Best Practice for OS, FW, and SELinux" discusses organizations that have a duty to ensure that the operating systems underuse are in a position to protect the sensitive data contained in them.... This move permits the addressing of threats of tampering plus bypassing of the application security mechanisms whilst enabling the confinement of the damage that could be brought about by flawed or malicious applications.... This approach will fit environments like colleges where the implementation of other security mechanisms has remained to be a challenge....
7 Pages (1750 words) Assignment

Evidence-Based Techniques for Evaluating Cyber Protection Systems for Critical Infrastructures

The actions required to improve the effectiveness and security of critical infrastructures are primarily in the model of defense against malevolent attacks.... The methods proposed in this research apply a somewhat unique group of security technology primitives, involving system management primitives, monitoring, access control, authentication, data-aging protection, integrity checking, and encryption.... hellip; This, alongside the growing reliance of societies on critical infrastructure systems that guarantee the delivery of essential, basic services, obliges every state and organization to prioritize the protection of these systems....
1 Pages (250 words) Essay

Weighing System for IT Project

The business growth and security of the financial systems will then provide more opportunities within the business and will secure future projects that are needed within the business.... The top three priority considerations for the IT projects in 2011 are based on law mandates and the security of the organization.... The HR system is the top priority, specifically because it not only is a security breach but also because it will cut costs and will enhance the internal environment....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us