<< Chapter < Page | Chapter >> Page > |
In addition to the allow/disallow model of security, a system with a high level of security will also offer auditing options. These would allow tracking of requests for access to resources (such as, "who has been reading this file?").
Security of operating systems has long been a concern because of highly sensitive data held on computers, both of a commercial and military nature. The United States Government Department of Defense (DoD) created the Trusted Computer System Evaluation Criteria (TCSEC) which is a standard that sets basic requirements for assessing the effectiveness of security. This became of vital importance to operating system makers, because the TCSEC was used to evaluate, classify and select computer systems being considered for the processing, storage and retrieval of sensitive or classified information.
They may only use up a small percentage of the CPU time, but consider how many machines use the same program, all the time.
They perform more functions for more users than any other program.
When "the (operating) system" is down, the computer is down. Reliability and recovery from errors becomes critical.
More hours of user time is spent dealing with the operating system. Visible changes in the operating system cause many changes to the users.
[1] [link] (External Link)&qpmr=15&qpdt=1&qpct=3&qptimeframe=M&qpsp=101
Current systems have many millions lines of code. Involve 10-100 person years to build.
The code is written and rewritten. Original intent is forgotten (UNIX was designed to be cute, little system - now 2 volumes this thick). Bug curve should be decreasing; but actually periodic - draw.
Deal with ugly I/O devices, multiplexing-juggling act, handle errors ( hard! ).
Handles interrupts, and must change what it is doing thousands of times a second - and still get work done.
Run Doom, Java, Fortran, Lisp, Trek, Databases, Web Servers, etc. Everybody wants their stuff to run well.
Most of OS do not work very well, it crash too often, too slow, awkward to use, etc. Usually they do not do everything they were designed to do. They do not adapt to changes very well, e.g new devices, processors, applications. There are no perfect models to emulate.
Notification Switch
Would you like to follow the 'Operating systems' conversation and receive update notifications?