View on GitHub

os202

OS202

HOME


Top 10 List of Week 02

  1. Security
    Security refers to providing a protection system to computer system resources such as CPU, memory, disk, software programs and most importantly data/information stored in the computer system. If a computer program is run by an unauthorized user, then he/she may cause severe damage to computer or data stored in it. So a computer system must be protected against unauthorized access, malicious access to system memory, viruses, worms etc

  2. The C Language
    Bahasa pemrograman C merupakan salah satu bahasa pemrograman komputer yang dibuat pada tahun 1972 oleh Dennis Ritchie untuk Sistem Operasi Unix di Bell Telephone Laboratories. C Language sering digunakan dalam mengembangkan software aplikasi. Website tersebut membantu pemulai untuk memahami C Language karena cuku lengkap.

  3. Biometrics
    Biometrics is measure of biological or behavioral features which are used for identification of individuals. Most of these features are inherit and cannot be guessed or stolen. The biometric feature being used must be available in the database for all individuals in the community before the feature can be used for authentication.

  4. Cryptography
    Cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet, and confidential communications such as credit card transactions and email.

  5. Symmetric and Asymmetric Key Encryption
    Symmetric-key encryption is easy to use but less secure, the technique is by using a key and the same key is used to decrypt the message. In asymmetric key encryption it is more secure than symmetric key encryption but is much slower.

  6. Access matrix
    Merupakan perlindungan dalam sistem komputer yang direpresentasikan sebagai matriks yang digunakan untuk menentukan hak dari setiap proses yangg dijalankan di domain terkait dengan objek. Setiap entri (i, j) mendefinisikan himpunan operasi yang dapat dijalankan oleh proses dalam domain

  7. Access control list
    An access-control list (ACL), with respect to a computer file system, is a list of permissions associated with an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.

  8. Program Threats
    Jika program pengguna membuat proses dengan melakukan tugas berbahaya, maka itu dikenal dengan Program Threats. Salah satu contoh umum Program Threats adalah program yang dipasang di komputer yang dapat menyimpan dan mengirim kredensial pengguna melalui jaringan ke beberapa peretas. Beberapa program threats yang terkenal adalah Trojan House, Trap Door, Logic Bomb, Virus.

  9. Implementing Security Defenses
    Sebenarnya terdapat banyak solusi keamanan, mulai dari memeriksa sistem secara berkala hingga adanya program anti virus. Beberapa implementing security defenses : security policy, vulnerability assessment, intrusion detection, virus protection, auditing, accounting, and logging

  10. Authentication
    Authentication is the process of identifying users that request access to a system, network, or device. It is the responsibility of the Operating System to create a protection system which ensures that a user who is running a particular program is authentic. Access control often determines user identity according to credentials like username and password. Authenticating humans can be based on Something you know (password, PIN), Something you have (security token), Something you do, Something you are (biometrics) or Where you are.