After completing these activities you should be able to:
If you take a big picture view of a computer, you get three things:
You should understand what we mean by "the physical machine", and you should certainly understand "the user". What's meant by "programs running on the user's behalf" is simply that when you want to, for example, write a report, you launch a word processor program (e.g. Microsoft Word). The program you launched is performing tasks, printing files, etc, on your behalf. So what's the Operating System? On your laptops it's Windows, if you own an iPhone, it's iOS or if you have another smartphone it might be Android. On another computer it might be UNIX. The operating system is a special collection of programs. The operating system manages all the other programs running on the computer, and acts as an intermediary between those programs (or the user) and the physical machine. Neither the user nor a regular program manipulates a resource like the hard drive directly. Instead, they ask the operating system to manipulate the resource on their behalf. In this lesson we'll begin our exploration of operating systems.
An Operating System (OS) is a program (or collection of programs) that manages the physical computer and the programs that run on it (programs managing programs). There are many different OS's out there, and you may be familiar with several.
MS Windows - your laptops run Windows 10, meaning that the OS is Microsoft Windows version 10.
UNIX - UNIX is actually a family of OS's.
rona the course server runs a UNIX variant called Linux.
Apple's Mac OS X is a variant of UNIX.
Linux is going to play a role in this course.
It's what's called open source, which means that people are free to modify it to suit their needs.
A lot of security-related tools are built this way, i.e. they're variants of Linux.
iOS - Apple's iPhone, and iPad all run an operating system called iOS, which is designed for mobile devices.
Android - many smart phones run Google's Android OS, which is another OS built specifically for mobile devices.
Because the OS manages the computer and all the programs that run on the computer, it is of critical importance to security. It can restrict what Programs and users do to make sure they can't cause too much trouble on the system. Conversely though, when OS's have security flaws, it's a really big problem. Here is a recent example.
What Pillar of Cyber Security would you associate with logging onto a computer?
The OS generally provides three ways for Programs and users to access its services:
bar.txt, you would type:
move foo.txt bar.txtThe shell is an OS interface for both Programs and users.
C:is your hard drive,
E:is your DVD drive,
F:may be what gets assigned to your camera when you plug it in (a camera has a drive with a file-system for storing its photos). A file (or folder) is not defined uniquely by its name alone! Instead, it is defined uniquely by the path from the top or the hierarchy down to the file (or folder) in question, where the names in the path are separated by backslashes (
\'s). You can navigate these file hierarchies in Windows by clicking on the Start orb and choosing Computer from the right-hand side of the list that pops up. What you see at first is a screen with icons for each of the drive letters available on your system. Double click on
C:and what you see is a list of all the files and folders that comprise the next level down in the hierarchy rooted at
C:. Double click on
Usersand what you see is a list of all the files and folders that comprise the next level down from
C:\Users. Double click on your user name, and then on
Desktopafter that. You're now fairly far down in the hierarchy. If there was a file named
foo.txthere, its path would be
C:\Users\mxxxx\Desktop\foo.txtand while there may be many files named
foo.txton your system, there's only one with that exact path. BTW: In the file viewer, if you click on the icon at the far left of the address bar at the top, it prints out the path for you.
In the example hierarchy above, you see that there are three files named "hello.txt". There is no conflict, however, because they are in different directories. Their full path names are:
C:\Users\m9999\Desktop\hello.txt C:\Users\m9999\Downloads\hello.txt C:\Users\Public\hello.txt
The basic file system operations are to create or delete files and directories, to move (i.e. rename) files and directories, and to copy files and directories. You are probably familiar with how to do some of these kinds of things using the Windows GUI, a program Microsoft calls Windows Explorer.