SlideShare a Scribd company logo
1 of 6
Operating System
Real Time Operating System
The real time operating system is an operating system that intended to
serve real time applications that process the data as it come in , typically
without buffer delays.
A Real Time Operating System is a multitasking operating system
designed for real time applications.
Examples of RTOS
Embedded System , Industrial Robots,Scientific Research Equipment etc.
Vision of RTOS
 An RTOS simplify the creation of real time application
 This requires a good devolopement of software
 An RTOS can respond more quickly and predictably to an event than
other operating system
There are two basic design for RTOS
• 1.Event driven:-Switch task only when an event of higher
priority needs services called pre-emptive priority.
• 2. Time Sharing Design:-Switch task on a clock interrupt , and
events called Round Robin
Real Life Example of RTOS:-
Windows CE
QNX
RT Linux
Vx Works
Tron
ACTIVE LINE
Time Sharing System:-
Time Sharing is a technique which enables many peoples ,located at various
terminals , to use a particular computer at same time.
Processors Time , Which is shared among multiple users simultaneously is
term as Time Sharing.
CPU
USER2
USER4
USER3
USER1
Security and Protection of OS
In OS, Computer Security and Mechanism provided by an OS must
address the Following:-
Confidentiality or privacy-The requirement that information
mentioned by computer system be accessible by authorized parties.
External Protection of OS-
• Unauthorized Access:-Mechanism assuring only authorized
individuals se classified materials
• Malicious-Modification or Destruction
• Accidental-Introduction to inconsistency
• Authentication-How do we know the user is who she say she is .Can
have passwords of Domains.
Protection of password : Issues Include:-
1.It is very easy to guess passwords since people use simple and easily remembered
words.
2.Need exists to change password continually.
3.Limiting number of tries before locking up.
4.Use the complex password atleast 15 character.
Here we represent the Secure Devolopement Life Cycle
Security
requirment
Security Design
Implementation
Testing of
Security
Operation and
Mentainence
Application Level
Operating System
Firmware:BIOS
Application Level Security:-
• App Protect
• App licensing-enabling new business models
Secure OS:-
• Windows 10 IoT Featuring :-Bitlocker and Device Guard
Secure/Trusted Boot:-
• Secure Firmware upgrade
• Preventing tempering of the system BIOS

More Related Content

What's hot

What's hot (20)

Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Kernel security of Systems
Kernel security of SystemsKernel security of Systems
Kernel security of Systems
 
Osd diksha presentation
Osd diksha presentationOsd diksha presentation
Osd diksha presentation
 
Lesson 6 Processor Management
Lesson 6 Processor ManagementLesson 6 Processor Management
Lesson 6 Processor Management
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)
 
Os security issues
Os security issuesOs security issues
Os security issues
 
Security
SecuritySecurity
Security
 
Computer Operating System
Computer Operating SystemComputer Operating System
Computer Operating System
 
Operating system
Operating   systemOperating   system
Operating system
 
Class4
Class4Class4
Class4
 
Overview of various types of operating system
Overview of various types of operating systemOverview of various types of operating system
Overview of various types of operating system
 
Operating systems1[1]
Operating systems1[1]Operating systems1[1]
Operating systems1[1]
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Goals of protection
Goals of protectionGoals of protection
Goals of protection
 
Operating Systems 1 (12/12) - Summary
Operating Systems 1 (12/12) - SummaryOperating Systems 1 (12/12) - Summary
Operating Systems 1 (12/12) - Summary
 
Unit 2 process Management
Unit 2 process ManagementUnit 2 process Management
Unit 2 process Management
 
Code4vn linux day1 operating system concept
Code4vn linux day1 operating system conceptCode4vn linux day1 operating system concept
Code4vn linux day1 operating system concept
 
AN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI Learning
AN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI LearningAN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI Learning
AN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI Learning
 
Presentation1
Presentation1Presentation1
Presentation1
 

Similar to Operating system and security

Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security ConceptsMohit Saxena
 
Basic Software.pptx
 Basic Software.pptx Basic Software.pptx
Basic Software.pptxNiloyHasan12
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
UNIT-I-RTOS and Concepts
UNIT-I-RTOS and ConceptsUNIT-I-RTOS and Concepts
UNIT-I-RTOS and ConceptsDr.YNM
 
Unit 1 operating system
Unit 1 operating systemUnit 1 operating system
Unit 1 operating systemMeeta
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratMary Margarat
 
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...ApurvaLaddha
 
OS introduction.pptx
OS introduction.pptxOS introduction.pptx
OS introduction.pptxDivyaKS18
 
Comparing Features of Real Time OS and Distributed.pptx
Comparing Features of Real Time OS and Distributed.pptxComparing Features of Real Time OS and Distributed.pptx
Comparing Features of Real Time OS and Distributed.pptx42MOHDASIL
 
Embedded system software
Embedded system softwareEmbedded system software
Embedded system softwareJamia Hamdard
 
Unit 1os processes and threads
Unit 1os processes and threadsUnit 1os processes and threads
Unit 1os processes and threadsdonny101
 
Chapter 1 Introduction to Operating System Concepts
Chapter 1 Introduction to Operating System ConceptsChapter 1 Introduction to Operating System Concepts
Chapter 1 Introduction to Operating System ConceptsMeenalJabde
 

Similar to Operating system and security (20)

Kernel security Concepts
Kernel security ConceptsKernel security Concepts
Kernel security Concepts
 
Basic Software.pptx
 Basic Software.pptx Basic Software.pptx
Basic Software.pptx
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado
 
UNIT-I-RTOS and Concepts
UNIT-I-RTOS and ConceptsUNIT-I-RTOS and Concepts
UNIT-I-RTOS and Concepts
 
Operating System-adi.pdf
Operating System-adi.pdfOperating System-adi.pdf
Operating System-adi.pdf
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Os unit i
Os unit iOs unit i
Os unit i
 
Unit 1 operating system
Unit 1 operating systemUnit 1 operating system
Unit 1 operating system
 
Operating system
Operating systemOperating system
Operating system
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary Margarat
 
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
OVERVIEW OF OPERATING SYSTEM -Basic concepts of operating system like functio...
 
OS introduction.pptx
OS introduction.pptxOS introduction.pptx
OS introduction.pptx
 
Comparing Features of Real Time OS and Distributed.pptx
Comparing Features of Real Time OS and Distributed.pptxComparing Features of Real Time OS and Distributed.pptx
Comparing Features of Real Time OS and Distributed.pptx
 
Embedded system software
Embedded system softwareEmbedded system software
Embedded system software
 
1. Introduction to OS.ppt
1. Introduction to OS.ppt1. Introduction to OS.ppt
1. Introduction to OS.ppt
 
Unit 1os processes and threads
Unit 1os processes and threadsUnit 1os processes and threads
Unit 1os processes and threads
 
Chapter 1 Introduction to Operating System Concepts
Chapter 1 Introduction to Operating System ConceptsChapter 1 Introduction to Operating System Concepts
Chapter 1 Introduction to Operating System Concepts
 
Operating System
Operating SystemOperating System
Operating System
 
Embedded system
Embedded systemEmbedded system
Embedded system
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Operating system and security

  • 1. Operating System Real Time Operating System The real time operating system is an operating system that intended to serve real time applications that process the data as it come in , typically without buffer delays. A Real Time Operating System is a multitasking operating system designed for real time applications. Examples of RTOS Embedded System , Industrial Robots,Scientific Research Equipment etc. Vision of RTOS  An RTOS simplify the creation of real time application  This requires a good devolopement of software  An RTOS can respond more quickly and predictably to an event than other operating system
  • 2. There are two basic design for RTOS • 1.Event driven:-Switch task only when an event of higher priority needs services called pre-emptive priority. • 2. Time Sharing Design:-Switch task on a clock interrupt , and events called Round Robin Real Life Example of RTOS:- Windows CE QNX RT Linux Vx Works Tron
  • 3. ACTIVE LINE Time Sharing System:- Time Sharing is a technique which enables many peoples ,located at various terminals , to use a particular computer at same time. Processors Time , Which is shared among multiple users simultaneously is term as Time Sharing. CPU USER2 USER4 USER3 USER1
  • 4. Security and Protection of OS In OS, Computer Security and Mechanism provided by an OS must address the Following:- Confidentiality or privacy-The requirement that information mentioned by computer system be accessible by authorized parties. External Protection of OS- • Unauthorized Access:-Mechanism assuring only authorized individuals se classified materials • Malicious-Modification or Destruction • Accidental-Introduction to inconsistency • Authentication-How do we know the user is who she say she is .Can have passwords of Domains.
  • 5. Protection of password : Issues Include:- 1.It is very easy to guess passwords since people use simple and easily remembered words. 2.Need exists to change password continually. 3.Limiting number of tries before locking up. 4.Use the complex password atleast 15 character. Here we represent the Secure Devolopement Life Cycle Security requirment Security Design Implementation Testing of Security Operation and Mentainence
  • 6. Application Level Operating System Firmware:BIOS Application Level Security:- • App Protect • App licensing-enabling new business models Secure OS:- • Windows 10 IoT Featuring :-Bitlocker and Device Guard Secure/Trusted Boot:- • Secure Firmware upgrade • Preventing tempering of the system BIOS