Question

In: Computer Science

“The success of any system is determined by its ability to survive threats within its Operating...

“The success of any system is determined by its ability to survive threats within its Operating

Environment” explain this statement providing examples, use at least two external references to support your explanation. Cite them within the text using APA format. Add references at the end of the assignment also using APA format.

Solutions

Expert Solution

Answer:

It is indeed the truth, that the success of any system is determined by its ability to survive threats within its Operating Environment.

Some of the common vulnerabilities and threats in an OS environment are:

1. Program errors:  Whereby an error in the program code may allow a computer virus to access the device and take control

2. Intended Features: Legitimate, documented ways in which applications are allowed to access the system

If vulnerabilities are known to exist in an operating system or an application – whether those vulnerabilities are intended or not – the software will be open to attack by malicious programs.

Now, OS are designed and programmed in such a way that prevents new or unknown applications from gaining responsibility broad or complete access to files stored on the disk - or gaining access to other devices.  In effect, this type of restriction can boost security by blocking all malicious activity. However, this approach will also impose significant restrictions on legitimate applications – and that can be very undesirable.

If desktop operating systems, such as Windows or MacOS, were based on the principle of the ‘closed system’, it would be much more difficult – and maybe impossible in some cases – for independent companies to develop the wide range of third-party applications that consumers and businesses have come to rely on. In addition, the range of available web services would also be much smaller.

The Internet – and the world in general – would be a very different place:

  • A lot of business processes would be slower and less efficient.
  • Consumers would not benefit from the rich ‘customer experience’ and dynamic Internet services that they’ve come to expect.

To some extent, the risks that system vulnerability and malware bring may be the price we have to pay for living in a world where technology helps us to achieve our work and leisure objectives… more rapidly and more conveniently. However, choosing a rigorous antivirus solution can help to ensure you can enjoy technology’s benefits – in safety.

Note: I cannot add the resource links as it violates the rules of answering the question.

Hope you understand.

If you have any doubts or queries, feel free to ask by commenting down below.

And if my answer suffice to the requirements, then kindly upvote as an appreciation

Happy Learning :)


Related Solutions

The success of an airline depends heavily on its ability to provide a pleasant customer experience....
The success of an airline depends heavily on its ability to provide a pleasant customer experience. One dimension of customer service on which airlines compete is on-time arrival. The tables below contains a sample of data from delayed flights showing the number of minutes each delayed flight was late for two different airlines, Company A and Company B. Company A 34 59 43 30 3 32 42 85 30 48 110 50 10 26 70 52 83 78 27 70...
The success of an airline depends heavily on its ability to provide a pleasant customer experience....
The success of an airline depends heavily on its ability to provide a pleasant customer experience. One dimension of customer service on which airlines compete is on-time arrival. The tables below contains a sample of data from delayed flights showing the number of minutes each delayed flight was late for two different airlines, Company A and Company B. Company A 34 59 43 30 3 32 42 85 30 48 110 50 10 26 70 52 83 78 27 70...
Two major computer threats to a system are hackers and viruses. Dfines cybercrime as any criminal...
Two major computer threats to a system are hackers and viruses. Dfines cybercrime as any criminal action perpetrated primarily through the use of a computer. 1. Using search engine on the Internet, find a current article (one written within the last 3 years) about a computer hacker or a computer virus. Give the site address, and the article title and author and date. 2. Write at least 5 sentences summarizing the article making sure to list any details about the...
What is an operating system? What are its functions? What are the types of operating system?
What is an operating system? What are its functions? What are the types of operating system?
Cyanide ion can be determined indirectly via atomic absorption based on its ability to dissolve silver...
Cyanide ion can be determined indirectly via atomic absorption based on its ability to dissolve silver while passing through a porous silver membrane, as described by the chemical equation 4 Ag(s) + 8 CN+2 H2O + O2 →4 Ag(CN)2 + 4 OH A series of silver standards analyzed by atomic absorption spectroscopy gave a linear calibration curve with a slope of 807 meter units per ppm Ag. (The "meter units" are linearly proportional to absorbance, and ppm Ag means µg...
List three different digital artifacts contained within a Windows operating system and how they can be...
List three different digital artifacts contained within a Windows operating system and how they can be used by a forensics analyst during a digital forensics investigation.
(Operating System CSE) Consider a file system in which a file can be deleted and its...
(Operating System CSE) Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What problems may occur if a new file is created in the same storage area or with the same absolute path name? How can these problems be avoided?2)Consider a file systemthat uses a modifiedcontiguous-allocation scheme with support for extents.A file is a collection of extents, with each extent corresponding to a contiguous set of...
Operating Systems Question 1.What is the maximum number of processes in the system at any time...
Operating Systems Question 1.What is the maximum number of processes in the system at any time using the following code segment? extern char mypath[]; for ( int i = 0; i < 10; i++ ) { pid_t pid, pid_out; unsigned char status; if ( pid = fork() ) pid_out = wait ( &status ); else execl ( mypath, "child", "parameter", NULL ); } Assume that child performs some simple computation and returns the result, that is captured in status.
Java Question here. Need to write a program that will check ANY operating system and find...
Java Question here. Need to write a program that will check ANY operating system and find out OS name and then write that info to a file in the data directory. here is where I am so far: public void writeOSName() { // TODO write the name of the operating system running this code to a file // in the data directory called os.txt // The file has to be written in the data directory of this project // Use...
Prove whether the set of all proofs within any formal system is decidable, recognizable, or unrecognizable
Prove whether the set of all proofs within any formal system is decidable, recognizable, or unrecognizable
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT