Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA

Similar documents
Introduction to Information System Layers and Hardware. Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA

Kaseya IT Automation Framework

HP Client Automation Standard Fast Track guide

05.0 Application Development

Exhibit to Data Center Services Service Component Provider Master Services Agreement

USER GUIDE: MaaS360 Services

Pearl Echo Installation Checklist

Radia Cloud. User Guide. For the Windows operating systems Software Version: Document Release Date: June 2014

Chapter 12. Development Tools for Microcontroller Applications

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Adobe Systems Incorporated

Securing the Service Desk in the Cloud

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation

Windows Embedded Security and Surveillance Solutions

Windows Operating Systems. Basic Security

Microsoft Windows Intune: Cloud-based solution

Information Technology Solutions. Managed IT Services

CHAPTER 15: Operating Systems: An Overview

Patch Management Policy

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines

Device Lifecycle Management

xassets Hosted Services Microsoft SAM Assist Audits with xassets

I.T. Assurance. Letting you do what you do best... run your business

Information Technology Solutions

Symantec Asset Management Suite 7.5 powered by Altiris technology

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Introduction. PCI DSS Overview

Stellar Active Directory Manager

Implementing HIPAA Compliance with ScriptLogic

Windows Server 2003 default services

System Security Policy Management: Advanced Audit Tasks

System Center Configuration Manager Overview

Page 1 of 5

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

System Management. What are my options for deploying System Management on remote computers?

Reducing the cost and complexity of endpoint management

Demystifying Virtualization for Small Businesses Executive Brief

Symantec Client Management Suite 7.6 powered by Altiris technology

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Example of Standard API

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Information security controls. Briefing for clients on Experian information security controls

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Information Technology Services

Managed Service Plans

IBM Endpoint Manager Product Introduction and Overview

Table of Contents. Cisco Cisco VPN Client FAQ

GLOSSARY OF TECHNICAL TERMS

Application Security Policy

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.

SUMMIT ASSET MANAGEMENT DATASHEET

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Computers: Tools for an Information Age

Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are

Operating System Structures

Interact Intranet Version 7. Technical Requirements. August Interact

Chapter 5: Operating Systems Part 1

Symantec Backup Exec.cloud

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Preparing a SQL Server for EmpowerID installation

Multi-core Programming System Overview

Client Hardware and Infrastructure Suggested Best Practices

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Chapter 6, The Operating System Machine Level

GLOSSARY OF TECHNICAL TERMS

BSM for IT Governance, Risk and Compliance: NERC CIP

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

BM482E Introduction to Computer Security

A Decision Maker s Guide to Securing an IT Infrastructure

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

MSP Service Matrix. Servers

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

Distribution One Server Requirements

Guardian365. Managed IT Support Services Suite

Desktop Virtualization. The back-end

Virtualization s Evolution

Why you need an Automated Asset Management Solution

System Security Plan University of Texas Health Science Center School of Public Health

RES ONE Automation 2015 Task Overview

StruxureWare Power Monitoring 7.0.1

Using WMI Scripts with BitDefender Client Security

White Paper. Managed IT Services as a Business Solution

WhatsUpGold. v3.0. WhatsConnected User Guide

Online Transaction Processing in SQL Server 2008

FUNCTIONAL OVERVIEW

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Transcription:

Systems Software Introduction to Information System Components Chapter 1 Part 2 of 4 CA M S Mehta, FCA 1

Systems Software Learning Objects Task Statements 1.1 Identify deployment of different components of IT and their functions Operating system software Knowledge Statements 1.2 Fundamental concepts of different components of IT and their functions Operating System Software 2

Topics Covered Systems Software Operating Systems Access Control in Windows Other Types of System Software Software Asset Management 3

What Is Systems Software? 4

Software Set of instructions Tells the computer what to do Accomplishes desired task when executed in a sequence Most critical function- directs the working of computer hardware and causes a computer to perform useful tasks 5

Software Architecture S Y S T E M S O F T W A R E Users interact with Application Packages System Software Operating System Data communication APPLICATION PACKAGES Data Base management software (DBMS) MS-OFFICE (Word, Excel, Access),Payroll, Sales etc System Access software control is a collection of computer programs Tape and used disk in design, management processing systems and Program control of library application management packagesystems DEVLOPMENT PACKAGES Network management software Visual Basic, Java, VC++, etc Program Development Tools UTILITIES etc Job scheduling Middleware Access Control Utility software programs Operating System Hardware - Firmware 6

Operating Systems Set of programs which acts as intermediary agent between the user and the computer hardware permits sharing and use of resources. It controls and manages the computer hardware resources among various processes. 7

Types of Operating Systems Single User OS Multi User OS Multi Processing OS Real time OS One user uses System at a timesingle or multi tasking Several users use System at a time OS operates on system with more than one processor Used in embedded systems with only small set of tasks 8

Need For Systems Software 9

OS Capabilities Multitasking allows computing systems to run two or more applications concurrently. Multiprocessing links more than one processor (CPU) Multithreading runs several processes or threads of a program simultaneously. 10

Core Tasks of OS Processor Management Memory Management Device Management File Management Secondary Storage Management Networking Application Programme Interface User Interfaces With System 11

Operating Systems Resource Manager Perform Hardware Function Providing user interfaces. Hardware independence through API Memory Management, Virtual Memory Networking-Permits users to share hardware and data. Time Sharing-Schedules resources among users. Manage resources and processing. 12

User Interface One of the most important functions of OS is to provide user interface Application software What is the price of RIL (RIL$) Operating System software Fetch RIL$ from hard disk,track1 sector 7 Application Program Interface 13

Memory and Processor Management 14

Core components of an OS OS holds a computer together- Glue binds H/w with S/w Kernel Layer Controls Access to Hardware Schedules System resources.. Memory, CPU,.. Enforces Security to System Resources Shell Layer Surrounds kernel Provides Interface for Applications 15

Programming Languages What to do & How to do What to do The instruction ADD 2 and 5 and assign the result to variable y written in different programming languages 16

Programming Software Assembler Assembly level code Machine code Language Compiler 3GL Code(As a single unit) Machine code Checks for errors in 3GL code Language Interpreter 3GL Code (Each program statement) Machine code Easier to debug Slow execution SQL Engine SQL Statement Machine code 17

Program Development Software Linker Process of combining various pieces of code and data together to form single executable unit that can be loaded in memory. Loader Loads code & data of executable code memory executes program Debugger Identify problem occurring during execution.help locate bugs Editors Allows user to create & Edit files w/out special characters Write source code 18

Some more System Software Access Control Software Data Communication Software Utility Programs Tape and Disk Management Software 19

Access Control Software Access Control Software is used for Secure access to data, files, system resources Assign ownership of all data for accountability Logging Access Activity 20

Data Communication Software Communications software is generally embedded in the computer operating system. Communications software assists Operating System in managing local and remote terminal access to host resources to manage security E.g. terminal emulators, file transfer programs 21

Utility Programs Functions To manage a computer's functioning To improve operational efficiency e.g. Defragmenters To understand application systems. To facilitate assessing or testing data quality. To test a program s ability to function correctly and maintain data integrity. To assist in fast program development. 22

Security & Controls Relating to Operating System 23

OS Security OS should be Robust Reliable, and free of Integrity flaws. Operating system's processes and kernel do the designated task as instructed. A malicious program could make these process do malicious tasks OS can be secured through proper user access and it has to be protected through anti-virus, firewalls, Anti spyware and patch management 24

Access Control in OS Access control is the process of authorizing users, groups and computers to access objects on the computer or network Operating system access controls First layer of access controls Rely on hardware features of processor or Associated memory management Basically control which memory addresses a process can access. 25

Access Control in OS - ACL ACLs are widely used in environments where users manage their own file security, such as the Unix File is the smallest object in OS Access control deals with files ACL is a matrix of access permissions, with columns for files and rows for users 26

Access Control List (ACL) Match User/Role with Object Specifying Capabilities File A File B Prog X Role A Read Write Write Role B Read Read Write Role C Execute 27

Access Control in OS ACLs are used in OS with Roles. Role= set of Users Administrator, Guest Assign permissions to roles Each user gets permission through Role 28

Access Controls in UNIX Each file(object) has owner and group Permissions set by owner Could be Read, write, execute to Owner, group, other Only owner, root can change permissions 29

Access Control in Windows - Steps User Creation Create Password Assign Roles User rights & privilege Permissions Security Auditing 30

Create User In Windows 7 Go to Control Panel > User Accounts > Manage accounts 31

Create Password In Windows 7 Go to Control Panel > User Accounts > Manage accounts 32

Assign Role In Windows 7 Go to Control Panel > User Accounts > Manage accounts Default Roles could Be Standard User or Administrator 33

User Rights & Permissions User Rights apply to user accounts, and Permissions attached to objects Assigning User Rights Start> Control Panel>System and security>administrative Tools> Local Security Policy 34

User Rights Assigning User Rights Start> Control Panel>System and security>administrative Tools> Local Security Policy Click on User Rights assignment 35

Permissions Permissions are attached to objects Right Click on Properties > Security Tab > Advanced or Edit 36

Auditing User Access Audit access to Object, Logon, System events Logging User Events Start> Control Panel>System and security> Administrative Tools>Local Security Policy>Local Policies> Audit Policy 37

Understanding Software Asset Management 38

Software Asset Management ITIL Definition Software Asset Management is all of the infrastructure and processes necessary for the effective management, control and protection of the software assets within an organization, throughout all stages of their lifecycle. 39

Software Asset Management Covers: Software from Purchasing Deploying Managing And tracking Purchase to Retirement of the software SAM is a key process for any organisation to meet its legal, financial and reputational responsibilities 40

SAM answers the following Questions What is installed in the environment? What is supposed to be installed? Who is using the Software? How much are they using it? Are they supposed to be using it? How are they using it? Can they prove they re allowed to use it? 41

Why SAM? Software is an Asset - needs Management Cost Savings Through Standardisation, Volume licensing Reducing Redundancy, Streamlined Operations Risk Management Streamlined Operations Good Governance Reduce business, reputational and legal risks Trouble free Software, peace of mind Better compliance, Good IT Governance Disaster Protection Updated inventory, offsite backups 42

Steps to SAM Take Inventory Get organised Policies & Standards Software acquisition Software storage Software Implementation, Use Software Retirement Maintenance 43

Inventorisation Make an inventory by viewing the Add/Remove Programs list PC serial number: Inventory date: Department/ Business Unit: PC used by: Employee ID number or position: Employee telephone extension: Software Installations: Publisher Software Title Version Number Number of Installations As suggested by Microsoft 44

System Software Acquisition Business, functional and technical needs and specifications Cost and benefit(s) Obsolescence Compatibility with existing systems Security Demands on existing staff Training and hiring requirements Future growth needs Impact on system and the network performance 45

System Software Implementation System Software Implementation System Software Change Control Procedures Software Licensing Issues 46

Maintain Proof of ownership The global piracy rate for PC software hovers at 42 percent. http://globalstudy.bsa.org/2011 Proof of ownership When we acquire software, it's important to keep the following: Software License Terms -End User License Agreement (EULA) Certificate of Authenticity (COA) Original media and manuals Purchase invoice and/or receipt 47

Application Software Acquisition Considerations Compatibility Reliability Benchmarks Version Support 48

Application Software Development Requirement Definition Maintenance Post Implementation Review Changeover & Implementation Requirement Analysis Coding Design Testing 49

What is an Endpoint An endpoint device is an Internet-capable computer hardware device on a TCP/IP network. Where an information stream is generated or ends. Could be a: Computer Laptops smart phones Thin clients, POS terminals etc. 50

Endpoint Management In any distributed Environment endpoints need to be deployed, configured, patched, secured and supported. Endpoint Management Solutions encompass Patch Delivery Inventory Software distribution OS deployment Remote control capabilities Provide Visibility into the state of endpoints to support 51

Why End Point Management Analyse vulnerabilities (patched or insecure configurations) Easily and automatically remediate all the networked endpoints Establish and enforce configuration policies across the endpoints Distribute and update software packages View, modify, and audit properties of the endpoints 52

Benefits of End Point Management Cross platform support Understanding what we have and where it is Centralised management for greater control Standardised systems to drive consistency Simplify compliance Improve service levels Optimised client and server software assets Measured and improved IT performance Automated IT processes Enables end user self-service Simplified software license audits 53

What is Digital Rights Management (DRM) Technologies and systems that prevent users doing thing with content that the content provider does not want Removes usage control from the person in possession of digital content > Computer program 54

Why DRM To protect the property rights of an enterprise s assets To establish the awareness of Intellectual Property Rights (IPR) in society. 55

Digital Rights Management Digital Rights Management is the process of defining, tracking and enforcing permissions and conditions through electronic means and throughout the content lifecycle. DIGITAL CONTENT CREATION DISTRIBUTI ON STORAGE RETRIEVAL USE DISPOSAL 56

Where is DRM used? E-book server restricts copying of material Software on DVD restricts copying of content not more than twice 57

Auditing Software 58

Auditing System Software Acquisition Review system software selection procedures As per I S requirements and business plan. Same selection criteria applied to all acquisitions Review cost/benefit analysis Total Cost of Ownership considered while deciding. Impact on data security. Financial stability of the vendor s operations 59

Auditing System Software Review controls over the installation of changed system software Changes should be scheduled when they least impact routine working Fall-back or restoration procedures in place, on production failure. Review Configuration Management Review of the pre-defined/default user accounts Review of Services enabled as per business requirements Review of Resources which are accessible by default by all users Review of Procedures for controlling application of patches Whether Admin/Super User accounts accessed through a secured access control mechanism? At a PC level, whether a personal firewall enabled? 60

Auditing System Software Review system software maintenance activities Whether changes made to the system software documented. Vendor support for Current versions of the software Whether Vendor s maintenance activities are logged. Review systems documentation Parameter tables. Activity logs/reports. 61

Auditing System Software Review authorisation documentation to determine whether: Changes to access authorisation documented. Attempted violation reported and follow-up Review system software security to determine whether: Circumvention of logical security access control restricted. Vendor-supplied installation passwords changed during installation 62

We have learnt about Systems Software Operating Systems Access Control in Windows Other Types of System Software Software Asset Management Digital Rights Management 63

References Ralph M. Stair, George W. Reynolds, Principles of Information Systems, Cengage Learning IT Asset Management. Net BSA.org http://www.gcflearnfree.org/computerbasics/2 64

Systems Software Thank You 65