Dynamic Semi-Group CIA Pattern Optimizing the Risk on RTS

Dynamic Semi-Group CIA Pattern Optimizing the Risk on RTS

Padma Lochan Pradhan (Gokul Institute of Technology & Science, Bobbili, VZM, AP, India)
Copyright: © 2017 |Pages: 20
DOI: 10.4018/IJDCF.2017010104
OnDemand PDF Download:
No Current Special Offers


The preventive control is one of the best well advance control for recent complex IS Security Application to protect the data and services from the uncertainty, hacker, and unauthorized users. Now, increasing the demand and importance of business, information & communication system & growing the external risks is a very common phenomenon for everywhere. The RTS security put forward to the management focus on IT infrastructure. This work contributes to the development of an optimization pattern that aims to determine the optimal cost to be apply into security mechanisms deciding on the measure components of system security and resources. The author's mechanism should be design in such way, the Confidentiality, Integrity, Availability, Authenticity and Accountability are automatically PDC for all the time. The author has to optimize the system attacks and down time by implementing semi-group structure CIA pattern, mean while improving the throughput of the Business, Resources & Technology. Finally, the author has to maximize the protection of IT resources & Services for all the time and every time. This proposed CIA Pattern is the part of protection, detection, benchmarking, fault analysis and risk assessment of real time operating system and applicable to efficient resource management on web application.
Article Preview

1. Introduction

Nowadays, increasing the demands and importance of business, computer & communications system by complex IT industries has increased the risk on the IT infrastructure for all the time and every times in around the globe. The real time operating system functions, control & audit is a primary method of protecting system resources along with business, resources & technology for all the time and every times. The system control is probably the most important aspect of RT security. The PC is inversely proportional to the Risk and mean while control is directly proportional to the QoS (S). The system control provides accountability for individuals who are accessing sensitive information on application, system software, server and network. We have to develop the CIA model for risk mitigation on real time Unix operating system based on available technology, business & resources (Thomas, 1998).

The real time operating system is a collection of hardware, software & application that manages system resources and provides common services for resources, program, application & users. The operating system is an essential component of the system software (shell, file & kernel) in computer system. The high level language (application programs) usually requires an operating system to function. The time-sharing operating systems schedule & reschedule tasks for efficient use of the internal utilities that may also include auditing system software for resource & cost allocation of processor and memory time, mass storage, printing and other resources (Das, 2009; Kai, 2008; O’ Reilly,1995; Sun-Microsystem, 2002).

The Real time operating system is a multitasking, time sharing & distributed operating system that executing real-time applications. The real-time operating systems often use specialized scheduling algorithms so that they can achieve a deterministic nature of behavior. The main objective of real-time operating systems is their quick and predictable response to events. They have an event-driven or time-sharing design and often aspects of both. An event-driven system switches between tasks based on their priorities or external (resources) events while time-sharing operating systems switch tasks based on clock interrupts(Das, 2009; Kai, 2008; O’ Reilly,1995; Sun-Microsystem, 2002).

There are many more system control available and applied on real time operating system to protect our valuable IT assets for external & internal hacker. The PDC-CIA model & Mechanism traditionally prevent the core components of RTOS (Julie, 2000). The processor & memory is the core components of any types operating system. The processors and kernel is fully functional dependency on each other, but file and shell is the communication components of the OS. We can improve the performance of OS by updating the kernel time to time. Kernel is the Nucleus of the operating system (Das, 2009; Kai, 2008; O’ Reilly,1995; Sun-Microsystem, 2002).

Complete Article List

Search this Journal:
Volume 14: 1 Issue (2022): Forthcoming, Available for Pre-Order
Volume 13: 6 Issues (2021): 5 Released, 1 Forthcoming
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing