Section Menu

CPSC 2800: Introduction to Operating Systems (Non-IA course)

Course Description

Basic operating system principles, job control languages and operating system internals. The hardware/software interface; file systems; resource management; command languages; segmentation, paging and virtual memory; other virtual resources. Detailed examination of two or more current operating systems, such as Windows, UNIX or Novell NOS. Prerequisite: CPSC 1110 with a minimum grade of C or department head approval. Supplementary course fee assessed.

Text

Silberschatz, A. & Galvin, Peter: Operating System Concepts with Java, 8th Edition, Addison-Wesley, 2010. ISBN: 978-0-470-50949-4

Lecuter Notes:

Lecture 1: Introduction

Lecture 2: Operating System Structures

Lecture 3: Processes

Lecture 4: Threads

Lecture 5: CPU Scheduling

Lecture 6: Process Synchronization

Lecture 7: Deadlocks

Lecture 8: Memory Management

Lecture 9: Virtual Memory

Lecture 10: File System

Lecture 11: Mass Storage

Lecture 12: I/O System

Lecture 13: Protection

Lecture 14: Security

Hands-on Labs

Linux Hands-on Labs

1. Install Linux in VMware and Introduction to Linux Essence

2. Developing Linux Application in Java, C and C++

3. Explore Linux file system and file security

4. File processing

5. Advanced File Processing

6. Shell Script Programming

7. Linux Utilities 

Simulation

1. Process Scheduling Simulation

2. Process-Consumer Simulator 

3. Address Translation Simulator 

4. Concurrent IO Simulator Exercises

Textbook

Required: Silberschatz, A. & Galvin, Peter: Operating System Concepts with Java, 8th Edition, Addison-Wesley, 2010. ISBN: 978-0-470-50949-4.

Syllabus

References

Journal

  • ACM Special Interest Group in Operating Systems., Symposium on Operating Systems Principles., International Conference on Architectural Support for Programming Languages and Operating Systems., & Symposium on Operating Systems Design and Implementation (OSDI). (1969). Operating systems review. New York, N.Y: ACM Special Interest Group on Operating Systems.
  • Association for Computing Machinery. (1983). ACM transactions on computer systems. New York: Association for Computing Machinery.
  • Windows IT security. (2005). Loveland, CO: Penton Media.
  • Thomson Gale (Firm). (2000). Mobile application platforms and operating systems. London: Informa UK.
  • Association for Computing Machinery. (1983). ACM transactions on computer systems: A publication of the Association for Computing Machinery. Baltimore, MD: Association for Computing Machinery.
  • UNIX/world. (1984). Los Altos, CA: Tech Valley Pub.

Article

  • Chapin, S., & Worringen, J. (May 01, 2001). Operating Systems. International Journal of High Performance Computing Applications, 15, 2, 115-123.
  • Operating systems. (January 01, 2013). Mena Report.
  • Operating Systems. (August 01, 1994). Computer - Aided Engineering, 13, 8, 9.
  • Longbottom, C. (January 01, 2005). operating systems It may have fewer security vulnerabilities than Windows, but can Linux match the Microsoft operating system's support, applications and user experience? ; Is Linux a viable alternative to Windows?. Computer Weekly, 26.
  • Operating systems. (January 01, 1994). Unix Review, 12, 10, 52.
  • Goodwin, B. (January 01, 2005). Longhorn will be strategy's key test, say analysts.(operating systems security feature). Computer Weekly, 16.
  • Ames, B. (January 01, 2003). Real-time software goes modular: reliability and security are crucial for embedded real-time operating systems in mission- and life-critical military and aerospace applications, so RTOS designers seek to improve their offerings by isolating and fine-tuning the most important parts of their operating systems.(technology focus). Military & Aerospace Electronics, 14, 9.)
  • Lemos, R. (January 01, 2007). The new security threats: more secure operating systems mean that attackers are looking elsewhere for holes to sneak through.(SECURITY WATCH). Pc Magazine, 26, 1-2.

Book

  • Madnick, S. E., & Donovan, J. J. (1974). Operating systems. New York: McGraw-Hill.
  • Lorin, H., & Deitel, H. M. (1981). Operating systems. Reading, Mass: Addison Wesley.
  • Raval, V. H., & Fichadia, A. (2007). Risks, controls, and security: Concepts and applications. Hoboken, NJ: Wiley.

Resources

Secure Use

General Security Policy: Cyber Ethics

Cyber Ethics 

General Security Policy: Information Technology Security Evaluation Criteria (ITSEC)

ITSEC Definition 

General Procedures: Inference

Inference Definition 

General Procedures: Rainbow Series

Rainbow Series 

General Procedures: NSTISSAM COMPUSEC/1-99 Insider Threat to Government Computer Systems

NSTISS Glossary 
TEMPEST 

General Countermeasures and Safeguards: Computer Law

Computer Law 

General Countermeasures and Safeguards: Computer Media

Computer Media 
Remanence 

General Countermeasures and Safeguards: Evaluate Security Testing Tools

Security Testing Tools 

Administrative Countermeasures/Safeguards: Control Management

Change Control 
Control Management 

Administrative Countermeasures/Safeguards: Privacy Act

Privacy Act of 1974 

Operations Policies/Procedures: Keystroke Monitoring

Keystroke Monitoring 

Operations Policies/Procedures: Disaster Recovery Planning

Disaster Recovery 

Incidents

Policy and Procedures: Incident Response

Incident Response 

Policy and Procedures: Witness Interrogation

Witness Interrogation 

Operations Countermeasures/Safeguard: Computer Attacks

Computer Attacks 
Computer Virus Timeline 

Operations Countermeasures/Safeguard: Computer Emergency Readiness Teams

CERT 

Configuration

Administrative Policies/Procedures: Approval to Operate

Approval to Operate 

Administrative Policies/Procedures: Configuration/Change Control

Change Control 

Administrative Policies/Procedures: Copyright Protection

Copyright Protection 

Administrative Policies/Procedures: Patch Management

Patch Management 

Administrative Policies/Procedures: Records Management

Records Management 

Administrative Policies/Procedures: Wireless Use Policies

Wireless Use Policy 

Anomolies and Integrity

General Risk Management: Computer System Risk Management

Risk Management 

Access Control Safeguards: Computer System Access Control

Access Control 

Access Control Safeguards: Protected Distribution Systems

Protected Distribution System 

Access Control Safeguards: Information Systems Access Restrictions

Access Restrictions 

Administration

Access Control Mechanisms: KMI Applications

Key Management 

Access Control Mechanisms: Single Sign-on

Single Sign On 

 

IA Sites

©