Now a day, increasing the complex business, applications, client, users, and resources over a heterogeneous business domain of the multiple location of WAN, LAN, IT Infrastructure, computer & communications system by IT industries has increased the uncertainty, un order, risk of theft to proprietary information. The operating system control & audit is a primary method of protecting system resources (Processor, Memory, Kernel & File system). The preventive system control is probably the most important aspect of communications security and becoming increasingly important as basic building block for information system security and risk management (Stalling, 2006). The control is inversely proportional to the risk & mean while control is directly proportional to the quality of standard(S) (Pressman, 2001). The preventive control provides accountability for individuals who are accessing sensitive information on application, system software, server and network. We have to develop the N dimensional hypercube model for risk mitigation on large scale UNIX operating system based on available technology, business and resources. We have to prevent our data and service from public resources and unauthorized user over a complex operating system (Schneier, 1996; Weber, 2002).
1.1. Real Time Operating System
The most fundamental system program is the operating system, whose job is to control all the resources of the computer and provide a base upon which is the application program can be written. The concept of the operating system as primarily providing its users with a convenient interface is a top-down view. The morden computer system consists of professors, memories, times, firmware, disk, network interfaces, printer and associates with a wide verity of other devices. When a computer or network has a multiple users, the need for managing and protecting the memory, I/O devices and other resources is even greater, since the users might otherwise interface with one another. In addition, users often need to share not only hardware, but information (files, databases, etc) as well. In short, this view of the operating system holds that its primary task is to keep track of who is using which resources, to grant resource requests, to account for usage, and to mediate conflicting requests from different programs and users (Tanenbaum, 2010). The resource management including multiplexing (sharing), time sharing resources in two ways: in time and in space. When resource is time multiplexed, different programs or users take turns using it. First one of them gets to use the resources, then another, and so on. To determining how the resource is time multiplexed – who goes next and for how long- is the task of the RTOS (Tanenbaum, 2010).
The operating system (server system) is a large scale has even greater responsibilities and powers for large scale multiple business for multiple products & clients like web based and mobile computing. It is just like a traffic management system, it makes sure that different tools, application, programs and software packages, the users and clients running at the same time do not interfere with each other (Kai, 2008). The multi programming, time shearing, parallel programming is solving our objective in right time and right way over a multiple Relation, Function, Operation & Services on heterogeneous complex infrastructure. The complex operating system is also responsible for risk and security ensuring that unauthorized users do not access the system (Tanenbaum, 2010). All major computer platforms (hardware, software and application) require and sometimes include an operating system: Main Frame, HP_UX, Sun solaria, AIX, LINUX, WINDOW, NT, WIN2000, VME, OS/400, Z/OS all examples of large scale operating systems (Sun Microsystems, 2002).