What Are the Best Tips for Operating System Security?

Chapter 1 Introduction to Operating Systems 1
1.1 The role of the operating system 1
1.1.1 Operating System Concepts 1
1.1.2 The status of the operating system 3
1.1.3 The role of the operating system and its application in military information 4
1.2 Development History of Operating System 6
1.2.1 Early operating systems 6
1.2.2 Traditional Operating System 7
1.2.3 Modern Operating System 9
1.3 Introduction to Common Operating Systems 10
1.3.1 Windows Series 10
1.3.2 The UNIX Family
1.3.3 LINUX and others 15
Exercises 1 19
Chapter 2 Process Management 20
2.1 Basic Concepts of Processes 20
2.1.1 Process definition and characteristics 20
2.1.2 Process Status and Transformation 22
2.1.3 Process Description
2.1.4 Process Queues
2.2 Process Control, Synchronization, and Communication
2.2.1 Process Control
2.2.2 Basic Issues of Process Synchronization
2.2.3 Basic Issues of Process Communication
2.3 Threads
2.3.1 Basic Concepts of Threads
2.3.2 Synchronization and Communication Between Threads
2.3.3 Implementation of Threads
2.4 Process Scheduling
2.4.1 Scheduling Concepts and Models
2.4.2 Scheduling Guidelines
2.4.3 Scheduling Algorithms
2.5 Deadlocks
2.5.1 Deadlock Concepts
2.5.2 Deadlock Prevention
2.5.3 Deadlock Avoidance
2.5.4 Deadlock Detection
2.5.5 Deadlock Release 62
2.5.6 Comprehensive Deadlock Processing
Exercises 2 65
Chapter 3 Storage Management 67
3.1 Storage Management Overview 67
3.1.1 Storage Management Functions
3.1.2 Memory allocation and reclamation
3.1.3 Relocation
3.1.4 Storage Protection
3.2 Continuous Allocation Storage Management
3.2.1 Fixed partition method
3.2.2 Dynamic Partitioning
3.2.3 Relocatable partition method
3.3 Paging Storage Management
3.3.1 The basic idea of paging storage management
3.3.2 Pages and Page Tables 77
3.3.3 Address Mapping in the Paging System
3.4 Segmented Storage Management
3.4.1 Basic Ideas of Segmented Storage Management
3.4.2 Address Mapping for Segmented Systems
3.4.3 Segment Sharing and Protection
3.4.4 The Difference Between Paging and Segmentation
3.5 Segment Paged Storage Management
3.5.1 Basic Ideas of Segmented Page Storage Management
3.5.2 Address Mapping for Segmented Page Management 86
3.6 Virtual Storage
3.6.1 The Concept of Virtual Storage
3.6.2 Implementation Method of Virtual Memory
3.7 Page Replacement Algorithm
3.7.1 The Best Replacement Algorithm
3.7.2 FIFO Permutation Algorithm
3.7.3 The least recently used replacement algorithm
3.7.4 Other Permutation Algorithms
Exercise 3 94
Chapter 4 File Management 96
4.1 File System Overview
4.1.1 Files and File Systems
4.1.2 File Naming and Attributes
4.1.3 File Operations
4.2 File Organization Structure and Access Methods 103
4.2.1 File Logical Structure
4.2.2 File Physical Structure
4.2.3 File Access Methods
4.3 File Directory Management
4.3.1 File Directory Concepts
4.3.2 File Directory Structure
4.3.3 File Directory Operations
4.4 File System Implementation
4.4.1 File System Format
4.4.2 File Storage Allocation
4.4.3 Free Storage Space Management
Problem 4 132
Chapter 5 Device Management 134
5.1 Overview of Device Management
5.1.1 Equipment Classification and Identification
5.1.2 IO System Structure
5.1.3 Device Controller
5.1.4 IO System Control Methods
5.1.5 Device Management Functions
5.2 Device Assignment
5.2.1 Equipment Allocation Related Factors 143
5.2.2 Device Allocation Algorithm
5.2.3 SPOOLing Technology
5.3 IO Software
5.3.1 IO Software Hierarchy
5.3.2 Interrupt Handlers
5.3.3 Device Drivers
5.3.4 Device Independence Software
5.3.5 User-Level IO Software
5.4 Disk Scheduling and Management
5.4.1 Disk Scheduling
5.4.2 Disk Management
Problem 5 160
Chapter 6 Operating System Security 161
6.1 Operating System Security Issues
6.1.1 Security Threats Faced by the Operating System
6.1.2 Development History of Operating System Security
6.1.3 Terms Related to Operating System Security
6.2 Operating System Security Mechanisms
6.2.1 Access Control
6.2.2 Identification and Identification
6.2.3 Security Auditing
6.2.4 Security Configuration
6.3 Operating System Security Model
6.3.1 Concepts, Functions, and Features of Security Models
6.3.2 Classification of Security Models
6.4 Operating System Security Architecture
6.4.1 Security Architecture Concepts
6.4.2 Security Architecture Types
6.4.3 Typical Security Architecture
6.5 Operating System Security Evaluation 185
6.5.1 Safety Evaluation Method
6.5.2 Domestic and foreign safety evaluation guidelines 187
6.5.3 CC 188
6.5.4 Chinese National Standard GB 178591999 189
6.5.5 Chinese Recommendations
6.6 Operating System Security Practices
6.6.1 Windows Operating System Security Technology
6.6.2 UNIX Linux Operating System Security Technology
Exercise 6 208
References 209

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?