CPSC 2800: Introduction to Operating Systems
(Non-IA course)
Course Description
Basic operating system principles, job control languages and operating system internals. The hardware/software interface; file systems; resource management; command languages; segmentation, paging and virtual memory; other virtual resources. Detailed examination of two or more current operating systems, such as Windows, UNIX or Novell NOS. Prerequisite: CPSC 1110 with a minimum grade of C or department head approval. Supplementary course fee assessed.
Text
Silberschatz, A. & Galvin, Peter: Operating System Concepts with Java, 8th Edition, Addison-Wesley, 2010. ISBN: 978-0-470-50949-4
Lecture Notes
Lecture 1: Introduction
Lecture 2: Operating System Structures
Lecture 3: Processes
Lecture 4: Threads
Lecture 5: CPU Scheduling
Lecture 6: Process Synchronization
Lecture 7: Deadlocks
Lecture 8: Memory Management
Lecture 9: Virtual Memory
Lecture 10: File System
Lecture 11: Mass Storage
Lecture 12: I/O System
Lecture 13: Protection
Lecture 14: Security
Hands-on Labs
Linux Hands-on Labs
1. Install Linux in VMware and Introduction to Linux Essence
2. Developing Linux Application in Java, C and C++
3. Explore Linux file system and file security
Simulation
1. Process Scheduling Simulation
3. Address Translation Simulator
4. Concurrent IO Simulator Exercises
Textbook
Required: Silberschatz, A. & Galvin, Peter: Operating System Concepts with Java, 8th Edition, Addison-Wesley, 2010. ISBN: 978-0-470-50949-4.
Syllabus
References
Journal
- ACM Special Interest Group in Operating Systems., Symposium on Operating Systems Principles., International Conference on Architectural Support for Programming Languages and Operating Systems., & Symposium on Operating Systems Design and Implementation (OSDI). (1969). Operating systems review. New York, N.Y: ACM Special Interest Group on Operating Systems.
- Association for Computing Machinery. (1983). ACM transactions on computer systems. New York: Association for Computing Machinery.
- Windows IT security. (2005). Loveland, CO: Penton Media.
- Thomson Gale (Firm). (2000). Mobile application platforms and operating systems. London: Informa UK.
- Association for Computing Machinery. (1983). ACM transactions on computer systems: A publication of the Association for Computing Machinery. Baltimore, MD: Association for Computing Machinery.
- UNIX/world. (1984). Los Altos, CA: Tech Valley Pub.
Article
- Chapin, S., & Worringen, J. (May 01, 2001). Operating Systems. International Journal of High Performance Computing Applications, 15, 2, 115-123.
- Operating systems. (January 01, 2013). Mena Report.
- Operating Systems. (August 01, 1994). Computer - Aided Engineering, 13, 8, 9.
- Longbottom, C. (January 01, 2005). operating systems It may have fewer security vulnerabilities than Windows, but can Linux match the Microsoft operating system's support, applications and user experience? ; Is Linux a viable alternative to Windows?. Computer Weekly, 26.
- Operating systems. (January 01, 1994). Unix Review, 12, 10, 52.
- Goodwin, B. (January 01, 2005). Longhorn will be strategy's key test, say analysts.(operating systems security feature). Computer Weekly, 16.
- Ames, B. (January 01, 2003). Real-time software goes modular: reliability and security are crucial for embedded real-time operating systems in mission- and life-critical military and aerospace applications, so RTOS designers seek to improve their offerings by isolating and fine-tuning the most important parts of their operating systems.(technology focus). Military & Aerospace Electronics, 14, 9.)
- Lemos, R. (January 01, 2007). The new security threats: more secure operating systems mean that attackers are looking elsewhere for holes to sneak through.(SECURITY WATCH). Pc Magazine, 26, 1-2.
Book
- Madnick, S. E., & Donovan, J. J. (1974). Operating systems. New York: McGraw-Hill.
- Lorin, H., & Deitel, H. M. (1981). Operating systems. Reading, Mass: Addison Wesley.
- Raval, V. H., & Fichadia, A. (2007). Risks, controls, and security: Concepts and applications. Hoboken, NJ: Wiley.
Resources
Secure Use |
|
General Security Policy: Cyber Ethics |
Cyber Ethics |
General Security Policy: Information Technology Security Evaluation Criteria (ITSEC) |
ITSEC Definition |
General Procedures: Inference |
Inference Definition |
General Procedures: Rainbow Series |
Rainbow Series |
General Procedures: NSTISSAM COMPUSEC/1-99 Insider Threat to Government Computer Systems |
NSTISS Glossary
|
General Countermeasures and Safeguards: Computer Law |
Computer Law |
General Countermeasures and Safeguards: Computer Media |
Computer Media
|
General Countermeasures and Safeguards: Evaluate Security Testing Tools |
Security Testing Tools |
Administrative Countermeasures/Safeguards: Control Management |
Change Control
|
Administrative Countermeasures/Safeguards: Privacy Act |
Privacy Act of 1974 |
Operations Policies/Procedures: Keystroke Monitoring |
Keystroke Monitoring |
Operations Policies/Procedures: Disaster Recovery Planning |
Disaster Recovery |
Incidents |
|
Policy and Procedures: Incident Response |
Incident Response |
Policy and Procedures: Witness Interrogation |
Witness Interrogation |
Operations Countermeasures/Safeguard: Computer Attacks |
Computer Virus Timeline |
Operations Countermeasures/Safeguard: Computer Emergency Readiness Teams |
CERT |
Configuration |
|
Administrative Policies/Procedures: Approval to Operate |
Approval to Operate |
Administrative Policies/Procedures: Configuration/Change Control |
Change Control |
Administrative Policies/Procedures: Copyright Protection |
Copyright Protection |
Administrative Policies/Procedures: Patch Management |
Patch Management |
Administrative Policies/Procedures: Records Management |
Records Management |
Administrative Policies/Procedures: Wireless Use Policies |
Wireless Use Policy |
Anomalies and Integrity |
|
General Risk Management: Computer System Risk Management |
Risk Management |
Access Control Safeguards: Computer System Access Control |
Access Control |
Access Control Safeguards: Protected Distribution Systems |
Protected Distribution System |
Access Control Safeguards: Information Systems Access Restrictions |
Access Restrictions |
Administration |
|
Access Control Mechanisms: KMI Applications |
Key Management |
Access Control Mechanisms: Single Sign-on |
Single Sign On |
IA Sites
- National Security Agency, Central Security Service—Information Assurance
- Information Assurance Support Environment
- Information Design Assurance Red Team (IDART)
- National Institute of Standards and Technology (NIST) Computer Security Division
- NIST Computer Security Resource Clearinghouse
- National Telecommunications and Information Administration (NTIA)
- ICAT Metabase
- ICAT is a searchable index of information on computer vulnerabilities. It provides search capability at a fine granularity and links users to vulnerability and patch information.
- National Vulnerability Database (NVD)
- STRATCOM
- ASD NII
- Defense Advanced Research Projects Agency (DARPA)
- Defense Information Systems Agency (DISA)
- Internet Traffic Report
The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100 and is updated ever 15 minutes. Higher values indicate faster and more reliable connections. - Electronic Privacy Information Center Home Page
Public interest research center in Washington, D.C. - Information Security Portal
This site provides information concerning the topic of Information Warfare including security tools, the law and legal issues, espionage, terrorism, and information operations. - Internet Privacy Coalition
- International Computer Security Association (ICSA)
ICSA is known worldwide as an objective source for security assurance services. - Glossary of Information Warfare Terms
- Cyberwar - Information warfare and psychological operations
Provides information on the topics of propaganda analysis, online journals, index and metapages, general resources, intelligence agencies, and articles and documents. - Reliable Software Technologies (RST): Information Warfare
- Forum of Incident Response and Security Teams (FIRST)
- FIRST brings together a variety of computer security incident response teams from government, commercial, and academic organizations. FIRST aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large.
- International Association for Cryptologic Research (IACR)
The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose primary purpose is to further research in cryptology and related fields. - International Biometrics Industry Association (IBIA)
- Common Vulnerabilities and Exposures
- A list of standardized names for vulnerabilities and other information security exposures - CVE aims to standardize the names for all publicly known vulnerabilities and security exposures.
- Institute for Applied Network Security (IANETSEC)
The Institute for Applied Network Security is the premier membership organization for practicing information security professionals. The Institute's mission is to provide key technical and business insights to help members solve their most pressing professional challenges. - Reliability Information Analysis Center (RIAC)
Reliability Information Analysis Center (RIAC) : A Government and Industry focal point for Reliability, Maintainability, Quality, Supportability, and Interoperability related Engineering, Data, Software, Information, Training and Technical Assistance.