Operating Systems
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
>> Hello there and welcome back to
00:00
our next lesson, operating systems.
00:00
We spoke a little bit about operating
00:00
systems in our last lesson,
00:00
but we'll dig a little bit more into
00:00
what they are and what they do for computer systems.
00:00
We'll talk a little bit about
00:00
the integrity issues and one of the roles that they
00:00
play in this particular area. Let's begin.
00:00
Basically operating systems;
00:00
so they contain two programs,
00:00
interfaces between the users,
00:00
processes, and applications.
00:00
They are the front of house
00:00
for the computer system basically.
00:00
They basically provide the primary means of
00:00
managing and sharing computer resources.
00:00
The operating system controls how much there is space,
00:00
how much RAM, and
00:00
all the other processing power
00:00
that comes with a computer.
00:00
Now, modern operating systems also even capable of
00:00
supporting and enhancing hardware and architecture.
00:00
Things for example such as
00:00
virtual memory or handling
00:00
of multi-core processing, for example.
00:00
Now one of the key roles of
00:00
the operating system is the integrity,
00:00
and so the maintenance of the integrity.
00:00
What the operating system will do is basically
00:00
protect the system from
00:00
deliberate or accidental modification.
00:00
There are controls within the various levels
00:00
of the operating system to help along with this.
00:00
Ensure that privilege programs cannot be
00:00
interfered with by user programs.
00:00
There's a hierarchy of security
00:00
within the operating system to ensure that
00:00
the most sensitive privileged areas can
00:00
actually work with the front-end user programs,
00:00
and that also brings us into process isolation.
00:00
The operating system ensures that a single process can't
00:00
be interfered with or interfere with another process.
00:00
It also handles the activity logging and reporting,
00:00
so knowing exactly what the operating system is doing.
00:00
That's basically our lesson,
00:00
so we've just talked a little bit
00:00
about operating systems,
00:00
and the integrity issues,
00:00
and the controls that are in place around those.
00:00
I hope you enjoyed
00:00
this short lesson and I will see you at the next one.
Up Next