Sunteți pe pagina 1din 6

TUGAS 1 OPERATING SYSTEM

NAMA : HERDA PUNDHI SAPUTRA


NIM : L200174033
KELAS : X (INTERNASIONAL)

1. State the advantage and disadvantage of process management Operatyng System


from Windows, Linux, Solaris, and Mac OS !
 WINDOWS
Microsoft Windows is the most widely used GUI-based computer operating system in
the world. The beginning of the development of Windows is from QDOS (Fast and Dirty
Operating System) written by TIM Paterson of Seattle Computer in 1980. Then Bill Gates
of Microsoft bought a QDOS license and in 1981 increased the name to MS-DOS. And
now the window development is significant from the beginning of the evolution of
windows. The advantages and disadvantages are as follows:
A. Advantages
1. User-friendly operating system.
2. Complete support tools, more applications for the Windows platform.
3. Having access control that is very compatible with other operating systems,
because it cannot access data freely for all specific objects.
4. Close the file system with FAT, FAT16, FAT32, NTFS, and ISO9660 FATI.
5. Encrypted Text File System (EFS). This system is used to protect important data so
that it cannot be opened by other users.
B. Disadvantages
1. It's easy to catch the virus.
2. Prices are very expensive and cannot be reached by the user as a whole.
3. There are no three-dimensional effects and have a low image resolution.

 LINUX
A. Advantages
1. An operating system that is resistant to contracting the virus.
2. Linux is very stable, so it becomes the majority platform for internet servers, to
the film industry.
3. Linux is very good for networking.
4. Linux is a free and open operating system. So that it can be said, there is no
license fee to buy or use Linux.
5. Linux is a pure multiuser and multitasking operating system.
B. Disavantages
1. There are still not many suitable software to run on Linux.
2. Some hardware that seems difficult to provide drivers for Linux.

 SOLARIS
A. Advantages :
1. Free redistribution, each user can buy or freely provide the software by himself or
as part of a collection of distributors.
2. Derived works, everyone can change the code and redistribute it to the public.
No discrimination, the code is provided for everyone to be developed.
3. ZFS is a Similar Restore Facility like the Restore feature on the Windows
operating system.
4. Many observation and debugging tools, such as monitoring system tools,
modular debugger (MDB), dynamic tracing (D-Trace).
5. It has some form of virtulation, besides virtualization at the operating system
level like virtualization in Solaris Zone, OpenSolaris also supports virtualization for
Xvm hypervisors, Logical Domains (LDoms), virtualboxes and can also run on
VMware and some other virtualization frameworks.
6. Have a high level of scalability. OpenSolaris can run on a single processor or
multiprocessor with hundreds of terabytes of CPU and RAM.
7. AMP stack integration (Apache, MySQL, PHP) to run a web server.
Stable file system for databases, Internet servers, Intranet, file-server, Internet-client,
Java development.
8. Has a "almost" version of the Unix operating system. But there is no operating
system that is perfectly correct.
B. Disadvantages:
1. Price of expensive commercial operating systems (paid version).
2. The appropriateness of Linux innovation over time gives an impression to the
commercial Unix system.
3. The "almost" version of the Unix operating system is not as good as the
commercial Unix operating system.
4. Poor hardware drivers in the "almost" version are useless.
5. Little permission for officials.

 MAC OS
A.. Advantages
1. A glossy look that is great for graphic / multimedia design.
2. Not susceptible to viruses, because it is designed by security oriented.
3. Has a "sherlock" program that not only searches files on the hard drive and in the
local network, but also on the Internet.
4. High Performance especially for MAC OS X that can do everything in running
applications with good speed.
B. Disadvantages
1. Software for this OS is not as complete as Windows.
2. The price is still too expensive.
3. As if only intended for graphic designers.
4. Less suitable for server applications and games.

2. Mention types of threats from OS !.


Threats to operatng systems can be categorized into 4 types:
1. Interruptions / interruptions
Computer system resources are destroyed so they don't work. For example hard drive
destruction or cable cutting. This is a threat to availability.
2. Interception / interception
Unauthorized people can enter / access to system resources. For example copying
authorized files. This is a threat to confidentiality.
3. Modification / modification
Unauthorized people not only can access but also change, damage resources. Examples
of changing message content, or randomizing programs. This is a threat to integrity
4. Fabrication
Unauthorized people insert fake objects into the system. For example entering a fake
message, adding false data. From the categories above and if linked in everyday life we
will surely find problems in the computer.
3.Explain threats management of Windows, Linux, Solaris, dan MacOS !.

 Threats of windows
1.Confidentiality (secrecy), is the assurance that information on the
computer system can only be accessed by authorized parties and
modifications while maintaining the consistency and integrity of data in
the system.
2. Integrity (integrity), is the assurance that computer system resources
can only be modified by authorized parties.
3. Availability, is a guarantee that the computer system power supply is
available to parties authorized when needed.
 Threats of Linux
1.Fragmentation
Fragmentation is arguably the most dangerous threat facing Linux
container adoption in the business world. Obviously standards are
adopted easily, especially in image formats and level orchestration, most
companies will hate to embrace technology. The simple answer to "why"
is that no IT decision maker wants to be responsible for supporting a
losing horse.To use examples from the world of consumers, consider
someone at their home with HD-DVD players and accessories just to find
out Blu-Ray. Now some cost loss exponentially and that is what the
business world faces when it comes to Linux container standards.While
fragmentation is by far the most serious threat facing Linux container
adoption, it's also one of the most easily handled. Two new foundations,
both regulated by the Linux Foundation, have come into the last few
months to help eliminate the specter of fragmentation from the world of
Linux containers.The Open Container Initiative aims to provide low-level
standards for container image formats and runtime for container-based
application development.The Cloud Native Computing Foundation seeks
to drive standards, best practices and interoperability for the
technologies used to develop, run and scale distributed applications with
Kubernetes as a starting point for container orchestration.While these
two organizations are a fantastic start, the complexity of the entire
container life cycle requires constant attention from a standard point of
view. As technology continues to be refined for company adoption, it is
very likely that more "war format" -type clashes will occur so that it will
reach the open source community in general to help organize and
compile these arguments into common standards and practices. With
both initiative modeling after the open source community best practices,
we can hope that standardization continues to develop in an open place
without inhibiting or slowing down innovation.

2.'Partially open' is 'completely closed'


The threat of fragmentation also creates another important problem
when it comes to open-core containers or "fauxpen" offerings around
Linux containers. Although "Linux" in the name of broad appeal
throughout the proprietary and open stack, problems will arise but when
exclusive codes and services start their way to container-based solutions
that should be fully open."Fauxpen" threats are not new, we have seen
Unix and most recently with cloud computing solutions, especially
platforms as services (PaaS) and OpenStack-based offerings that seem
open but layers of proprietary technology above the open-source
foundation.Linux containers however are the beginning of their adoption
cycle for IT companies, if proprietary hooks that land into technology
now, must be innovation rather than a continuation of proprietary legacy
systems. From closed stacks to exorbitant licenses to greatly lowering
innovation, adding a "fauxpen" code to basic technology built on blood
sweat and tears from the public can quickly reduce enthusiasm and
breakthrough around the open base.
3.Container washing
During the days of cloud computing (which we arguably are still
undergoing), the idea of cloud washing was born. Effectively, IT vendors
will take existing products and guarantee "marketing", spec sheets and so
on with cloud jargon, hopefully convincing customers and prospects that
this existing vendor is a player in the developing world of cloud
computing.Now we see the washing container in the same tone as the
vendor and the solution that is only tangentially related (or not at all) to
the boom container trying their way into the conversation. The threat
here is far more clandestine than fragmentation or fauxpen sources, it's
one that overthrows the actual container.An example is confusion in a
container compared to a virtual machine. We certainly can run virtual
machines in containers or vice versa, but two technologies solve different
problems. Virtualization provides abstraction by combining infrastructure
services with application codes, containers allow for clear separation in
light software assets that lend themselves ideally as the main method for
delivering services.By conflating existing technology with those presented
by containers, this threat creates more confusion and headaches for
companies when it comes to container adoption. Instead of just choosing
what is best for them, the IT team must now investigate whether the
solution really provides Linux container benefits or is it purely marketing
speaking. This could easily lead to a decrease in adoption, as the IT team
is known for the most resistance path when it comes to applying
 Threats of solaris
Kaspersky Lab some time ago discovered a new threat to the Mac OS X
platform. On June 27, 2012, researchers at Kaspersky Lab successfully
intercepted an attack on Mac OS X targeting Uyghur activists. This attack
is part of the Advanced Persistent Threat (APT) activity.
The researchers analyzed this attack and concluded that the malicious
application was a new variant of the previously undetectable MaControl
backdoor, which supports both i386 and PowerPC Mac. Kaspersky named
this type of attack as Backdoor.OS .
After running, MaControl will install itself into the victim's Mac and
directly connect to the Command and Control (C & C) server to receive
commands. This program allows operators to list files, move files, and
execute Mac commands that are infected according to their wishes.
Kaspersky Lab identifies that the server is located in China."Mac
computers besides being popular globally, are also popular among high-
profile people who choose to use Mac OS X because they believe it is
safer," said Costin Raiu, Kaspersky Lab's Director of Global Research &
Analysis. "However, we believe as the use of Mac OS X increases, attacks
through mass infections and specific targets also develop. The attackers
will continue to update and improve their methods of combining
exploitation and social engineering techniques to try to infect victims. Like
malware on a PC, this combination is the most effective way and cyber
criminals will continue to challenge the security of Mac OS X users, both
technically and psychologically. "This is not the first time Kaspersky Lab
has identified APT attacks targeting Mac OS X users. In April 2012,
Kaspersky Lab researchers released information about APT's active
activities, SabPub, which attacked the Mac OS X platform

 Threaths of Solaris
The weakness of the Solaris operating system is that it requires a large
capacity, is not free, the display is less attractive. Solaris is not limited to a
SERVER computer / internet service provider. Solaris is expected to still
look for reference references on the Solaris operating system to add and
refresh insight into the Solaris operating system considering that Solaris
operating systems are rarely found in the community. From this weakness
Solaris also has advantages such as strong security and almost stable
programs

S-ar putea să vă placă și