Computer Science: An Overview (13th Edition) (What's New in Computer Science)
Computer Science: An Overview (13th Edition) (What's New in Computer Science)
13th Edition
ISBN: 9780134875460
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 3, Problem 4SI

Explanation of Solution

Responsibility of operating system in case of security breach:

Yes”, it is our responsibility to lock the house in such a way that intruders cannot get in. However, public also has moral duty not to enter a house unless invited.

Yes”, it is the duty of the operating system developers to safeguard the access to computer and its content so that that it cannot be leaked out by the hackers.

Explanation:

  • Operating system security is the process of ensuring integrity, confidentiality and availability.
  • Information insecurity costs billions in terms of information theft, financial theft, etc. Hacking leads to productivity loss, both when networks stop working and in dozens of minor security inconvenience that have to be endured.
  • It is the responsibility of operating system to create a protection system which ensures that the user who is running that particular program is authentic...

Blurred answer
Students have asked these similar questions
Is it permissible, in your opinion, to trade a small amount of privacy for free or nearly free software? Is there a method to hold them accountable for the data they collect and how they use it? Always be ready to defend your position. There must be evidence to support your claim.
Most software, including operating systems, is not error free when it is first released. Some programs, in fact, contain thousands of problems, called bugs. Software companies regularly release fixes (called patches) to correct known issues with released software. Many hackers and other criminals target these bugs with computer viruses or other attacks, frequently on the day a new vulnerability is announced—called a zero-day attack. Obviously, the acts by these criminals are not ethical, but what responsibility does a software company have to consumers if they are put at risk due to the company’s carelessness or rush to market? What responsibility do consumers have to make sure they keep their computers patched against new vulnerabilities?
Operating systems and the vast majority of programmes do not begin their lives devoid of bugs. Applications have tens of thousands of bugs in them at any one time. It is common practise for software suppliers to give fixes for recognised software defects (also known as patches). Criminals often launch zero-day attacks the day after a newly discovered vulnerability is disclosed to the public. Nobody can dispute the immorality of what these criminals are doing, but a software firm has what duty to its customers if their inexperience or haste to compete in the market causes them harm? Users of computers are required to install the latest security updates.

Chapter 3 Solutions

Computer Science: An Overview (13th Edition) (What's New in Computer Science)

Ch. 3.3 - Prob. 3QECh. 3.3 - If each time slice in a multiprogramming system is...Ch. 3.3 - Prob. 5QECh. 3.4 - Prob. 1QECh. 3.4 - Suppose a two-lane road converges to one lane to...Ch. 3.4 - Prob. 3QECh. 3.4 - Prob. 4QECh. 3.5 - Prob. 1QECh. 3.5 - Prob. 2QECh. 3.5 - If a process in a multiprogramming system could...Ch. 3 - List four activities of a typical operating...Ch. 3 - Summarize the distinction between batch processing...Ch. 3 - Prob. 3CRPCh. 3 - Prob. 4CRPCh. 3 - What is a multitasking operating system?Ch. 3 - Prob. 6CRPCh. 3 - On the basis of a computer system with which you...Ch. 3 - a. What is the role of the user interface of an...Ch. 3 - What directory structure is described by the path...Ch. 3 - Define the term process as it is used in the...Ch. 3 - Prob. 11CRPCh. 3 - What is the difference between a process that is...Ch. 3 - What is the difference between virtual memory and...Ch. 3 - Suppose a computer contained 512MB (MiB) of main...Ch. 3 - What complications could arise in a...Ch. 3 - What is the distinction between application...Ch. 3 - Prob. 17CRPCh. 3 - Summarize the booting process.Ch. 3 - Why is the booting process necessary?Ch. 3 - If you have a PC, record the sequence activities...Ch. 3 - Suppose a multiprogramming operating system...Ch. 3 - Prob. 22CRPCh. 3 - Prob. 23CRPCh. 3 - Prob. 24CRPCh. 3 - Prob. 25CRPCh. 3 - Would greater throughput be achieved by a system...Ch. 3 - Prob. 27CRPCh. 3 - What information is contained in the state of a...Ch. 3 - Identify a situation in a multiprogramming system...Ch. 3 - List in chronological order the major events that...Ch. 3 - Prob. 31CRPCh. 3 - Prob. 32CRPCh. 3 - Explain an important use for the test-and-set...Ch. 3 - Prob. 34CRPCh. 3 - Prob. 35CRPCh. 3 - Prob. 36CRPCh. 3 - Prob. 37CRPCh. 3 - Each of two robot arms is programmed to lift...Ch. 3 - Prob. 39CRPCh. 3 - Prob. 40CRPCh. 3 - Prob. 41CRPCh. 3 - Prob. 42CRPCh. 3 - Prob. 43CRPCh. 3 - Prob. 44CRPCh. 3 - Prob. 45CRPCh. 3 - Prob. 46CRPCh. 3 - Prob. 47CRPCh. 3 - Prob. 48CRPCh. 3 - Prob. 49CRPCh. 3 - Prob. 50CRPCh. 3 - Prob. 51CRPCh. 3 - Prob. 52CRPCh. 3 - How is the window manager related to the operating...Ch. 3 - Prob. 54CRPCh. 3 - Prob. 55CRPCh. 3 - Suppose you are using a multiuser operating system...Ch. 3 - Prob. 2SICh. 3 - Prob. 3SICh. 3 - Prob. 4SICh. 3 - Prob. 5SI
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education