Article Preview
Top1. Introduction
Nowadays, increasing the demands and importance of business, computer & communications system by complex IT industries has increased the risk on the IT infrastructure for all the time and every times in around the globe. The real time operating system functions, control & audit is a primary method of protecting system resources along with business, resources & technology for all the time and every times. The system control is probably the most important aspect of RT security. The PC is inversely proportional to the Risk and mean while control is directly proportional to the QoS (S). The system control provides accountability for individuals who are accessing sensitive information on application, system software, server and network. We have to develop the CIA model for risk mitigation on real time Unix operating system based on available technology, business & resources (Thomas, 1998).
The real time operating system is a collection of hardware, software & application that manages system resources and provides common services for resources, program, application & users. The operating system is an essential component of the system software (shell, file & kernel) in computer system. The high level language (application programs) usually requires an operating system to function. The time-sharing operating systems schedule & reschedule tasks for efficient use of the internal utilities that may also include auditing system software for resource & cost allocation of processor and memory time, mass storage, printing and other resources (Das, 2009; Kai, 2008; O’ Reilly,1995; Sun-Microsystem, 2002).
The Real time operating system is a multitasking, time sharing & distributed operating system that executing real-time applications. The real-time operating systems often use specialized scheduling algorithms so that they can achieve a deterministic nature of behavior. The main objective of real-time operating systems is their quick and predictable response to events. They have an event-driven or time-sharing design and often aspects of both. An event-driven system switches between tasks based on their priorities or external (resources) events while time-sharing operating systems switch tasks based on clock interrupts(Das, 2009; Kai, 2008; O’ Reilly,1995; Sun-Microsystem, 2002).
There are many more system control available and applied on real time operating system to protect our valuable IT assets for external & internal hacker. The PDC-CIA model & Mechanism traditionally prevent the core components of RTOS (Julie, 2000). The processor & memory is the core components of any types operating system. The processors and kernel is fully functional dependency on each other, but file and shell is the communication components of the OS. We can improve the performance of OS by updating the kernel time to time. Kernel is the Nucleus of the operating system (Das, 2009; Kai, 2008; O’ Reilly,1995; Sun-Microsystem, 2002).