Article Preview
Top1. Introduction
The technical security controls for risk assessment can be configured to protect against given types of threats, unauthorized user & uncertainty to source and object. These controls may range from simple to complex measures and usually involve system architectures; engineering design and security packages with a mix of hardware, software, and firmware. All of these measures should work together to secure critical and sensitive data, information, and IT system functions. Technical controls can be grouped into the following: critical, major, minor (H, M, L) categories, according to primary purpose the organization (Thomas, 2000; Tanenbaum, 2010; Weber, 2002).
Now a day, increasing the multiple business, applications, client, users, resources over a complex business domain of the multiple location of WAN, LAN, IT Infrastructure, computer & communications system by complex web application ( B2B, B2C, P2P, G2G) has increased the risk of theft of proprietary information. The operating system control & audit is a primary method of protecting system resources (Processor, Memory& Encryption Key). The preventive system control is probably the most important aspect of communications security and becoming increasingly important as basic building block for information system security. The control is inversely proportional to the risk &mean while control is directly proportional to the quality of standard( S ). The preventive control provides accountability for individuals who are accessing sensitive information on application, system software, server and network. We have to develop the three dimensional hypercube model for risk mitigation on large scale unix operating system based on available product, business and resources. We have to prevent our data and service from public resources and unauthorized user over a complex operating system(O’Reilly, 1995;Sumitabh, 2009;Sun-Microsystem, 2002; Thomas, 1998).
The operating system (server system) in large scale has even greater responsibilities and powers for large scale business like web based and mobile computing. It is just like a traffic management system, it makes sure that different programs and software packages the users and clients running at the same time do not interfere with each other. The operating system is also responsible for risk and security angle to ensuring that unauthorized users do not access the objects.
In the large scale operating system the multitasking, multiuser, time sharing operating system where multiple programs can be running at the same time, the operating system determines which applications should run in what order and how much time should be allowed for each application before giving another application a turn. It manages the sharing of internal memory among multiple applications with multiple function and location. It handles input and output to and from attached hardware devices, such as hard disks, printers, and dial-up ports. On computers that can provide parallel processing, an operating system can manage how to divide the program (parallel program) so that it runs on more than one processor at a time(O’Reilly, 1995;Sumitabh, 2009;Sun-Microsystem, 2002; Thomas, 1998).