22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

equests from numerous users, and maintains rigorous control over the<br />

resources to ensure that one user doesn't affect any other user.<br />

Operating system tasks<br />

The operating system is responsible for various tasks within the computing<br />

environment. These tasks are often what makes one operating system more<br />

reliable or easier to use than another. How the OS handles these tasks<br />

determines the real power of the operating system:<br />

► Processor management: The operating system needs to ensure that each<br />

application gets a share of the processor's time, and that the processor is<br />

used efficiently to accomplish real work.<br />

► Memory management: This defines the methods by which the operating<br />

system allocates memory to applications and operating system functions.<br />

► Device management: Because a computer system is composed of various<br />

hardware components (hard drive, monitor, mouse, keyboard, and so on), the<br />

operating system must be able to manage how these components interact<br />

with each other.<br />

► Storage management: The operating system not only controls active<br />

resources, but defines how files and data are stored in a reliable fashion.<br />

► Application interface: An operating system is really a bridge between<br />

applications and the computer's resources, which means that it must provide<br />

application programming interfaces (APIs) for applications to connect.<br />

► User interface: Whether this is via a command line or a graphical user<br />

interface (GUI), the operating system is responsible for interacting with the<br />

end user.<br />

This is a very brief summary of the major tasks that an operating system should<br />

handle.<br />

The following sections describe security-related issues that the operating system<br />

must deal with to maintain confidentiality, integrity, and availability of system<br />

resources. We provide an overview of the two most common operating system<br />

families and the security features they include. We also describe the most<br />

common methods by which these security features can be attacked or bypassed,<br />

and how to protect against these types of attacks.<br />

From here on, we use as reference two key security books that every<br />

administrator of Windows or UNIX systems should have in their library, namely:<br />

► Maximum Windows 2000 Security (Sams, 2001, ISBN 0672319659)<br />

► Maximum Linux Security (Sams, 1999, ISBN 0672316706)<br />

Chapter 9. Server hardening 361

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!