Analysts need to have basic knowledge of the operating system. OS is the interface between the user and the hardware. It is the main software that manages the hardware and software resources within a computer. For it to work effectively, you need to have a good file structure. File structure enables the ability to read, write, and modify data. A good file structure minimizes the number of trips to disk. Without a proper structure, all the data will be all over the place and create problems. By separating data into numerous pieces and giving it names, data can be organized and make it easier for operating system to understand and utilize it. A configuration file for example can be created within the file structure, which defines the parameters, options, settings and preferences.
Within Windows OS, you have windows registry, which is a hierarchical database that contains configuration settings information that Windows operating system continually references during operation. It pretty much holds all the important settings for your computer’s operating system. To access it, you type regedit in the search bar and select the registry editor. This contains all configuration settings required for a computer to operate efficiently. Regedit lets you make admin/root level changes to your computer.
Hardware architecture focuses on physical components and their interrelationships. Critical parts that enable kernel, which is the central component of the operating system are CPU, memory, and devices. CPU is the brain that does processing and calculation and is responsible for executing instructions. Memory is a component that store data, instructions, and information that can can be accessed. Within the memory category, there are RAM, ROM, cache memory, and virtual memory. Devices can include anything from keyboard to mouse.
Analysts need to understand basic systems hardening methods, which are ways to reduce the attack surface. To accomplish systems hardening, analysts will need to apply the right tools, techniques, and best practices to reduce vulnerability. Some hardening actions you can take for operating system are update frequently, remove unnecessary drivers and apps, limit configuration, and disable unused services and ports.