Opearting Systems: Case Study 3

In a multiprogramming and time sharing environment, several users share a system simultaneously. In effect, security problems may arise in this kind of system. A good example are copying or cloning a user's files and by hacking the system. This phenomenon leads to the ineffectiveness and reliability of multiprogramming and time sharing environment. However, exploiting this security problems, let us have first the definition of the two terms used which we are referring this security problems. Multiprogramming is the allocation of a computer system and its resources to more than one concurrent or existing application, job or user. And for time sharing systems or environment is the sharing of a computing resources among many users by means of multiprogramming and multitasking. It was introduced in the 1960's time, and emergence as the prominent model of computing in the 1970's period time.

Now, unfolding the first security problem occurred in multiprogramming and time sharing problem is copying or cloning a user's files. This problem can be done by using system resources such as CPU or Central Processing Unit as the brain of the computer, memory, disk space as non-volatile storage device for digital data and the likes. One user may use and modify the data which is required by another user than can cause to serious problem. Like for instance, in Internet cafe that offers a shared system that enable to all the users in every workstation to provide distributive file system. This file systems will be responsible for the temporarily storage for that data. That data can be manipulated by any user within the distributive file system. When user A is planning to print a word document with 10 pages and a coloured font styles. Thus user A assumes that the original and authentic word document will be printed 10 pages all-in-all and a coloured font styles when it prints out. However, user B have a secretly scheme idea to change and modify the world document of user A with 10 pages and a coloured font styles into a 5 pages and all black font styles causing the print out to be altered.

How user B did it? Simple user B modified the word document at the time sharing system and the modified version gets printed by the server printer. In addition, not only user B can change
and modify any data and files present in the system, it could be user C, user D, and all of the users exist in the system.

Another issue that led to new problem was the users, particularly at universities or any school where the systems were being developed seemed to want to be hacking the system to get more CPU or Central Processing Unit time. For this reason, security and access control became a major issue. This security problem is focused on the computer security in a time sharing environment because any use can manipulate or change the protection of information and services that are protected from publication, tampering or collapse by unauthorized and untrustworthy individuals or users. Access control is the system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. Access control is, in reality, is like a PIN in your ATM account system at a bank. A lock on a car door is essentially a form of access control. In relation, any of the authorities in the time sharing environment can even be the cause of issue or a major problem in terms of its security feature. That authority or even a user can hack the system for maybe personal purposes or even just out of curiosity. Nevertheless, hacking the system is a big mess in the system for many users around the circle of users in a time sharing environment that will cause unwanted problems.

Can we ensure the same degree of security in a time sharing machine as we have? Perhaps a big no! Since any protection plan, design or program made by a human can also be broken. It is just like hacking a particular system. Everyone can do this hacking method; even my self can do it. So we, as users, we can never be as sure or reliable to the degree of security in a time sharing system.

Comments

Popular posts from this blog

Assignment 5

Operating System: Case Study 5

Travel Report - Major Field trip and Seminars