Understanding Operating Systems and Network Security

UNIT 1: Operating System (OS) Fundamentals

OS Functions

The Operating System acts as a bridge between hardware, users, and applications. It manages resources and ensures smooth communication between different components of a computer system.

Key OS Functions:

  • Processor Management: Distributes processor time among programs using scheduling algorithms.
  • Memory Management: Allocates and manages memory space for applications and users.
  • Input/Output Management: Controls and supervises program access to hardware resources through drivers.
  • Application Execution Management: Ensures applications run smoothly by providing necessary resources.
  • Authorization Management: Coordinates security and ensures only authorized users and programs access resources.
  • File Management: Manages file reading, writing, and access permissions within the File System.
  • Information Management: Provides indicators for diagnosing system performance and health.

OS Components

  • Kernel: The core of the OS, handling essential functions like memory, process, file, and I/O management.
  • Command Line/Shell: Enables user interaction with the OS through a control language.
  • File System: Organizes files in a hierarchical structure for easy access and management.

Hard Disk Basics

A hard disk is a non-volatile storage device using magnetic recording to store digital data. It consists of platters, heads, tracks, cylinders, and sectors.

Hard Disk Characteristics:

  • Interface: Communication medium between the hard disk and the computer.
  • Access Time: Time taken to locate data on the disk.
  • Read/Write Time: Time taken to read or write data.
  • Rotation Speed: Platter revolutions per minute, affecting data access speed.
  • Transfer Rate: Speed of data transfer between the disk and the computer.

UNIT 2: Network Essentials and Security

Types of Networks

By Size/Coverage:

  • Personal Area Network (PAN): Connects devices within a few meters.
  • Local Area Network (LAN): Covers a small area like a home, school, or office.
  • Metropolitan Area Network (MAN): Spans a city or metropolitan area.
  • Wide Area Network (WAN): Connects devices across cities, countries, or continents.

By Privacy Level:

  • Internet: A global, public network.
  • Intranet: A private network within an organization using internet technologies.
  • Extranet: Extends an intranet to authorized external users.

By Functional Relationship:

  • Client-Server: Clients access resources and services provided by servers.
  • Peer-to-Peer (P2P): Devices act as both clients and servers, sharing resources directly.

Network Basics

Understanding key networking concepts like communication protocols, IP addresses, gateways, network masks, DNS, MAC addresses, and ports is crucial for effective network management.

Wireless Network Types

  • Infrared: Uses infrared waves for short-range communication.
  • Bluetooth: Enables wireless data and voice transmission over short distances.
  • Wi-Fi: Provides wireless network access using radio waves.
  • Li-Fi: Utilizes visible light for high-speed data communication.

Mobile Technology Evolution

From 1G to 5G, mobile technology has evolved significantly, offering faster speeds, greater data capacity, and enhanced capabilities.

UNIT 3: Cybersecurity and Malware Protection

Cryptography

  • Symmetric Encryption: Uses the same key for encryption and decryption.
  • Asymmetric Encryption: Employs separate keys for encryption and decryption, enhancing security.

Protection Methods

  • Firewalls: Control and filter network traffic to prevent unauthorized access.
  • Proxy Servers: Act as intermediaries between clients and servers, adding a layer of security.

Wi-Fi Security

Protecting Wi-Fi networks with protocols like WPA2 is essential to prevent unauthorized access and ensure data confidentiality.

Malware Types

  • Viruses: Malicious programs that replicate and infect other files.
  • Trojans: Disguise themselves as legitimate programs but perform harmful actions.
  • Backdoors: Create hidden access points for unauthorized entry.
  • Keyloggers: Record user keystrokes, potentially stealing sensitive information.
  • Spyware: Secretly gathers user data and transmits it to third parties.
  • Adware: Displays unwanted advertisements, often intrusive and disruptive.

Malware Propagation

Malware spreads through various means, including software vulnerabilities, social engineering, infected files, and removable devices. Keeping software updated and practicing safe online habits are crucial for protection.