You are on page 1of 25

Information Search and Analysis Skills

(ISAS)

“Main Memory, Virtual Memory, Security in Windows 7”

1. Alia Dyah Puspita


2. Muhammad Adrian Giffary
3. M Sulthan Rafli Maajid

Class : 1SC5
Faculty : Muhammad Idham Khalif

Continuing Education Program Center for Computing and Information Technology


Faculty of Engineering, University of Indonesia
PREFACE
In the name of Allah, the Most Gracious, Most Merciful, we again pray for praise and
praise for his presence, which has become part of his mercy and blessings so that the ISAS Report
on Windows 7 can be resolved which God willing will benefit us all.

We have compiled this report as well as possible and get help from any parties so that it
can facilitate to created this ISAS report. For that, we would like to thank Mr Mhd. Idham Khalif
who have provided guidance in making this ISAS report.

This report is structured so that readers can find out about Windows 7, presented based on
many sources such as the internet, sample report and references. This ISAS report may provide
broader knowledge and thought contributions for readers.

Apart from all that, we are fully aware that there are still many mistakes .both in terms of
sentence arrangement and grammar. Therefore we accept all suggestions and criticisms from
readers so that we can improve this ISAS report and we hope the ISAS report on Windows 7 will
benefit readers

Depok, November 2018

Group 5
TABLE OF CONTENTS

PREFACE ...................................................................................................................................... 2

TABLE OF CONTENTS ............................................................................................................. 3

TABLE OF FIGURES .................................................................................................................. 4

TABLE OF TABLES.................................................................................................................... 5

CHAPTER I INTRODUCTION ................................................................................................. 6

I.1 Background .......................................................................................................................... 6

I.2 Writing Objective ................................................................................................................ 6

I.3 Problem Domain .................................................................................................................. 6

I.4. Writing Methodology ......................................................................................................... 7

I.5. Writing Framework ........................................................................................................... 7

CHAPTHER II BASIC THEORY .............................................................................................. 8

II.1 The Definition of Operating System ................................................................................. 8

II.2 The Examples of Operating System ................................................................................. 8

II.3 The Definition of Main Memory ....................................................................................... 9

II.4 The Definition of Virtual Memory.................................................................................... 9

II.5 The Definition of Security ............................................................................................... 10

CHAPTER III PROBLEM ANALYSIS ................................................................................... 13

III.1 Main Memory in Windows 7 ......................................................................................... 13

III.2 Virtual Memory in Windows 7 ...................................................................................... 18

III.3 Security System in Windows 7 ...................................................................................... 21

CHAPTER IV CONCLUSION AND SUGGESTION ............................................................ 25

IV.1 Conclusion ....................................................................................................................... 25

IV.2 Suggestion ........................................................................................................................ 25


TABLE OF FIGURES
Figure 2.1 Virtual Memory ............................................................................................................10
Figure 3.1 Main Memory 1 ............................................................................................................13
Figure 3.2 Main Memory 2 ...........................................................................................................14
Figure 3.3 Main Memory 3 ...........................................................................................................14
Figure 3.4 Main Memory 4 ...........................................................................................................15
Figure 3.5 Main Memory 5 ...........................................................................................................15
Figure 3.6 Main Memory 6 ...........................................................................................................16
Figure 3.7 Main Memory 7 ...........................................................................................................16
Figure 3.8 Main Memory 8 ...........................................................................................................17
Figure 3.9 Main Memory 9 ...........................................................................................................17
Figure 3.10 Virtual Memory 1 .....................................................................................................19
Figure 3.11 Virtual Memory 2 .....................................................................................................19
Figure 3.12 Virtual Memory 3 .....................................................................................................20
Figure 3.13 Virtual Memory 4 .....................................................................................................21
Figure 3.14 UAC ...........................................................................................................................23
Figure 3.15 Bitlocker ...................................................................................................................23
Figure 3.16 Windows Firewall ....................................................................................................24
TABLE OF TABLES

Tabel 2.1 Computer Security Classifications ....................................................................................12


CHAPTER I
INTRODUCTION

I.1 Background
In general, a computer system consists of hardware, software, and brainware where all
three are interrelated. An operating system is a program that acts as an intermediary between
computer users and computer hardware. The purpose of the operating system is to enable computer
resources to be used efficiently

Computer systems have many resources (hardware and software) needed to solve many
problems. for example: CPU Time, Memory Space, File Storage Space, I / O Devices (input /
output).

Currently there are many operating systems available on the market, one of them is
Windows 7. in the Windows 7 Operating System there are many important things, including main
memory, virtual memory,

This paper was written so that the reader understands the background of this operating
system from the system to the characteristics.

I.2 Writing Objective


The Objective to write this report to complete the task given by the faculty. This report is
called ISAS (Information Search and Analysis Skills). Purposed to improve the ability to search
and analyze the information. Therefore ISAS is made to gain knowledge about world of IT to
become a world class IT professionals.

I.3 Problem Domain


As for the problem of writing this ISAS are

- Understand of main memory in Windows 7


- Understand of virtual memory in Windows 7
- Understand of security system in Windows 7

I.4. Writing Methodology


In the preparation of this report, we used the method by finding sources from any sample
report, discussion and also internet.

I.5. Writing Framework


To facilitate the writing of ISAS, the systematics of writing is as follows:
- Chapter I Introduction
In Chapter I we will explain about Background, Writing Objective, Domani Problem,
Writing Methodoly, Writing Framework.

- Chapter II Basic Theory


In Chapter II we will explain the definition of the Operating System, the example of the
Operating System, the definition of main memory in Operating System, the definition of virtual
memory in Operating System, the definition of security in Operating System

- Chapter III Problem Analysis


In Chapter III we will explain more deeply about main memory in Windows 7, virtual
memory in Windows 7, security system in Windows 7

- Chapter IV Conlusion and Suggestion


In Chapter IV we will explain the conclusions and suggestions.
CHAPTHER II

BASIC THEORY

II.1 The Definition of Operating System


The Operating System is a program that manages computer resources and provide general
software application services. The Operating System is the most important type of system software
in a computer system. This Operating System is also very necessary to operate a computer that is,
by regulating processing time, checking errors, controlling input and output, performing
calculations, storing, processing data and in the form of related services. and in The Operating
System there are many important things like main memory, virtual memory, security, etc, which
functions to make the operating system work properly.

II.2 The Examples of Operating System


One example of an Operating System that is Windows OS, Windows OS is computer
operating system (OS) developed by Microsoft Corporation to run personal computers (PCs).
Featuring the first graphical user interface (GUI) for IBM-compatible PCs, the Windows OS soon
dominated the PC market. Approximately 90 percent of PCs run some version of Windows. There
are many versions of windows, one of which is Windows 7, Windows 7 made its official debut to
the public on October 22, 2009 as the latest in the 25-year-old line of Microsoft Windows operating
systems and as the successor to Windows Vista (which itself had followed Windows XP).
Windows 7 was released in conjunction with Windows Server 2008 R2, Windows 7's server
counterpart.

Enhancements and new features in Windows 7 include multi-touch support, Internet


Explorer 8, improved performance and start-up time, Aero Snap, Aero Shake, support for virtual
hard disks, a new and improved Windows Media Center, and improved security.
II.3 The Definition of Main Memory
Main memory is where programs and data are kept when the processor is actively using
them. When programs and data become active, they are copied from secondary memory into main
memory where the processor can interact with them. A copy remains in secondary memory. main
memory is intimately connected to the processor, so moving instructions and data into and out of
the processor is very fast.

In any physical computers, wheter it is mobile or desktop, there are two types of memory
called volatile memory and non-volatile memory.

 Volatile Memory : is a temporary memory as it is loses its contents when the device’s power
is turned off (RAM). For mobile devices, there are lots of RAM variations up to 8GB

 Non-Volatile Memory : is a permanent memory as it does not lose its contents when the power
turned off (ROM). For mobile devices, there are lots of ROM variations up to 128GB that can
be extended until 2TB with external memory.

Nothing permanent is kept in main memory. Sometimes data are placed in main memory
for just a few seconds, only as long as they are needed. Now, most PCs come with a minimum of
32 megabytes of main memory. You can usually increase the amount of memory by inserting extra
memory.

II.4 The Definition of Virtual Memory


Virtual memory is a method of using the computer hard drive to provide extra memory for
the computer. Segments of memory are stored on the hard drive known as pages. When a segment
of memory is requested that is not in memory, it is moved from the virtual memory to an actual
memory address.

Figure 2.1 Virtual Memory (REF : https://www.webopedia.com/TERM/V/virtual_memory)

The purpose of virtual memory is to enlarge the address space, the set of addresses a
program can utilize. For example, virtual memory might contain twice as many addresses as main
memory. A program using all of virtual memory, therefore, would not be able to fit in main
memory all at once. Nevertheless, the computer could execute such a program by copyinginto
main memory those portions of the program needed at any given point during execution.

To facilitate copying virtual memory into real memory, the operating system divides virtual
memory into pages, each of which contains a fixed number of addresses. Each page is stored on a
diskuntil it is needed. When the page is needed, the operating system copies it from disk to main
memory, translating the virtual addresses into real addresses.

II.5 The Definition of Security


Security is the part of Operating System that refers to the steps specified or actions used to
protect the OS from threats, viruses, worms, malware, or interference from remote hackers. OS
security includes all preventive-control techniques, which safeguard any computer assets that can
be stolen, edited or deleted if OS security is compromised.

OS security encompasses many different techniques and methods which ensure safety from
threats and attacks. OS security allows different applications and programs to perform required
tasks and stop unauthorized interference.

OS security may be approached in many ways, including adherence to the following:


 Performing regular OS patch updates
 Installing updated antivirus engines and software
 Scrutinizing all incoming and outgoing network traffic through a firewall
 Creating secure accounts with required privileges only (i.e., user management)

Computer Security Classifications :

Highest Level. Uses formal design


Type A specifications and verification techniques.
Grants a high degree of assurance of process
security.
Provides mandatory protection system. Have
all the properties of a class C2 system.
Attaches a sensitivity label to each object. It is
of three types.
 B1 − Maintains the security label of each
object in the system. Label is used for
Type B making decisions to access control.
 B2 − Extends the sensitivity labels to each
system resource, such as storage objects,
supports covert channels and auditing of
events.
 B3 − Allows creating lists or user groups
for access-control to grant access or
revoke access to a given named object.
Provides protection and user accountability
using audit capabilities. It is of two types.
 C1 − Incorporates controls so that users
can protect their private information and
Type C keep other users from accidentally
reading / deleting their data. UNIX
versions are mostly Cl class.
 C2 − Adds an individual-level access
control to the capabilities of a Cl level
system.
Type D Lowest level. Minimum protection. MS-DOS,
Window 3.1 fall in this category.

Table 2.1 Computer Security Classifications


CHAPTER III

PROBLEM ANALYSIS

III.1 Main Memory in Windows 7


Main memory is an important part of the operating system without playing memory
sufficiently the computer will not run properly or it will not run, in every operating system there
is always a minimum main memory that must be used. in Windows 7 it takes 1 gigabyte (GB)
RAM (32-bit) or 2 GB RAM (64-bit) to run Windows 7 smoothly.

And this is the minimum system requirements to run Windows 7 smoothly :

 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor


 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
 DirectX 9 graphics device with WDDM 1.0 or higher driver.

In Windows 7 you can also split the hard disk partition :

1. Select the Disk Management tool. Click on Disk Management on the left side of the window
and you should see all of the disks and their partitions on your computer.

Figure 3.1 Main Memory 1 (REF : www.wikihow.com/PartitionYourHardDriveinWindows7)


2. Make some space for the new partition. Right-click on the partition you wish to re-size and
select the Shrink Volume option.

Figure 3.2 Main Memory 2 (REF : www.wikihow.com/PartitionYourHardDriveinWindows7)

3. Shrink the drive. Enter the size you wish to shrink your drive to in megabytes (1000 MB =
1GB). Then click on the Shrink button.

Figure 3.3 Main Memory 3 (REF : www.wikihow.com/PartitionYourHardDriveinWindows7)


4. Create a new volume. You should now see a new unallocated partition in your Disk
Management window. Right-click on the unallocated partition and select the New Simple
Volume option.

Figure 3.4 Main Memory 4 (REF : www.wikihow.com/PartitionYourHardDriveinWindows7)

5. The New Simple Volume Wizard. The New Simple Volume Wizard should popup. Click on
the Next button to continue.

Figure 3.5 Main Memory 5 (REF : www.wikihow.com/PartitionYourHardDriveinWindows7)


6. Enter size of new partition. Enter the amount of memory you wish to allocate for your new
partition and click on the Next button.
7. Give the new volume a letter name or path. Select from the menu, a letter name for your new
partition and click on the “Next” button.

Figure 3.6 Main Memory 6 (REF : www.wikihow.com/PartitionYourHardDriveinWindows7)

8. Settings for the new volume.

Figure 3.7 Main Memory 7 (REF : www.wikihow.com/PartitionYourHardDriveinWindows7)


9. Create the new volume. Look over your settings and click on the Finish button.

Figure 3.8 Main Memory 8 (REF : www.wikihow.com/PartitionYourHardDriveinWindows7)

10. Format the new volume.

Figure 3.9 Main Memory 9 (REF : www.wikihow.com/PartitionYourHardDriveinWindows7)

11. Check new volume. If everything was done correctly, you should now see your new drive in
the Disk Management window.
III.2 Virtual Memory in Windows 7
Your computer has two types of memory, Random Access Memory (RAM) and Virtual
Memory. All programs use RAM, but when there isn't enough RAM for the program you're trying
to run, Windows temporarily moves information that would normally be stored in RAM to a file
on your hard disk called a Paging File. The amount of information temporarily stored in a paging
file is also referred to as virtual memory. Using virtual memory, in other words, moving
information to and from the paging file, frees up enough RAM for programs to run correctly.

The more RAM your computer has, the faster your programs will generally run. If a lack
of RAM is slowing your computer, you might be tempted to increase virtual memory to
compensate. However, your computer can read data from RAM much more quickly than from a
hard disk, so adding RAM is a better solution.

If you receive error messages that warn of low virtual memory, you need to either add more
RAM or increase the size of your paging file so that you can run the programs on your computer.

Change the size of virtual memory :

1. To open the System Properties, press + Pause

2. In the left pane, click Advanced system settings.


Figure 3.10 Virtual Memory 1 (REF : www.geeksinphoenix.com/ Virtual-Memory Windows-7)

3. On the Advanced tab, under Performance, click Settings.

Figure 3.11 Virtual Memory 2 (REF : www.geeksinphoenix.com/ Virtual-Memory Windows-7)

4. Click the Advanced tab, and then, under Virtual memory, click Change.
Figure 3.12 Virtual Memory 3 (REF : www.geeksinphoenix.com/ Virtual-Memory Windows-7)

5. Clear the Automatically manage paging file size for all drivescheck box.
6. Under Drive [Volume Label], click the drive that contains the paging file you want to change
7. Click Custom size, type a new size in megabytes in the Initial size (MB) or Maximum size
(MB) box, click Set, and then click OK. There is a formula for calculating the correct
pagefile size. Minimum pagefile size is one and a half (1.5) x amount of memory. Maximum
pagefile size is three (3) x minimum pagefile size. Say you have 4 Gb (4,096 Mb) of
memory. 1.5 x 4,096 = 6,144 Mb would be the min. pagefile size and 3 x 6,144 = 18,432 Mb
would be the max. pagefile size.
Figure 3.13 Virtual Memory 4 (REF : www.geeksinphoenix.com/ Virtual-Memory Windows-7)

III.3 Security System in Windows 7


Windows-based operating systems have always been plagued with a host of security flaws
and vulnerabilities, this is mainly because the systems were not designed with secure computing
in mind. They are also a popular target for hackers due to these flaws. In today’s increasingly
connected world we cannot allow our systems to be compromised without dire consequences.
Windows 7 has tried to address these issues by following a Secure Development Life Cycle
(SDLC), and this is a kind of Windows 7 security features :

1. Date Execution Prevention (DEP)

Data Execution Prevention (DEP) is a security feature that can help prevent damage to your
computer from viruses and other security threats. Harmful programs can try to attack Windows by
attempting to run (also known as execute) code from system memory locations reserved for
Windows and other authorized programs. These types of attacks can harm your programs and files.
DEP can help protect your computer by monitoring your programs to make sure that they use
system memory safely. If DEP notices a program on your computer using memory incorrectly, it
closes the program and notifies you.

2. Address Space Layout Randomization (ASLR)

Address space layout randomization is a technique to increase security from common


memory based attacks such as buffer overflows and stack smashing. ASLR randomizes several
sections of the program, such as the stack, heap, libraries, etc. This makes memory addresses much
harder to predict. In order to use ASLR, programs must be compiled using the ASLR flag, only
then will randomization occur during program runtime. Windows 7 completely supports ASLR
based applications and libraries.

3. User Account Control (UAC)

User Account Control is a Windows feature that will help you control the system in a user
way (in this case), or not. If you agree, UAC will give an order and if you do not agree then there
will be no further system.

When using a computer to perform tasks such as eMail, create Word-Excel documents,
access music and other tasks, all User Accounts can be used easily. However, to perform tasks
with administrator level (For example installing programs, removing programs and similar), UAC
will win whether you give permission or not. If at that time you enter using Administrator (or
another user with the same level) then you will click the Yes button for the command or click the
No button to cancel. If you are using a normal user, you cannot give a command whether the
command or reject the command. If you want to give permission, you must log in first using the
Administrator level user. Enter the Administrator username and password, then give UAC to work
on your command. For the time being, the user you are using has Administrator rights and will end
with the "whole command" that has finished running.
Figure 3.14 UAC (REF : https://resources.infosecinstitute.com/windows-7-security-features)

Because of this, the UAC function is stronger to prevent computers from attacking Spyware
or Malware because they cannot access it automatically.

4. BitLocker

BitLocker is one of the main features of the Windows 7 Ultimate OS, BitLocker is a feature
that functions as a locker / drive lock on the HDD partition on your computer to prevent others
from opening the internal drive partition, unless you know the drive partition password, so data
files are safe from theft. BitLocker also has an Encrytion function that will prevent data files taken
from the BitLocker drive space to be opened on another computer or system.

Figure 3.15 Bitlocker (REF : https://resources.infosecinstitute.com/windows7securityfeatures)


5. Windows Firewall/Defender

Windows 7 includes a new and improved Windows Defender. Windows Defender is an


anti-spyware and anti adware software that is included as part of the operating system itself.
Windows Defender can be updated like an Anti-virus solution. Windows Firewall is a host based
firewall that is included with each copy of Windows. It has been extensively overhauled in
Windows 7.

Figure 3.16 Windows Firewall (REF : http://techgenix.com/whats-new-windows-7-firewall)


CHAPTER IV

CONCLUSION AND SUGGESTION

IV.1 Conclusion
IV.2 Suggestion

You might also like