Information security is rapidly growing field. In particular, information protection has become an important era for personal information as well as public institutions such as government and company. The government and company which can be incurable in the face of massive damage, are committed to develop technology to block illegal online access and build trust with customers and citizens. Vulnerabilities in government and company expose employees to potential risks, is not security technologies. Also, employees can reveal sensitive information without unintentionally. The most basic of social engineering attacks occur when an attacker tries to access a network of company and government. The attackers often construct trust and exploit trust in employees of organisations that attempt to attack. For this reason, employees easily hand over access authorisation to attackers (Mouton, F., et al. 2016).
AbstractThe performance of modern computers is influenced by several factors such as processor speed, memory, disk capacity and disk processing speed. The growth of annual process speeds and disk capacity has increased by 40%. By comparison, the development of disk processing speed is 7% per year, which is greatly slow. Moreover, computers require and handle a lot of applications and large amount of data in recently. For this reason, I/O (Input and Output) scheduling is one of crucial factor in operating system. The meaning of reserving an I/O request is determining the order in which to execute the request. The I/O scheduling be able to improve the overall system, share device access fairly between processes, and reduce the average wait time for I/O to complete. Also, reordering the services is vital to I/O scheduling. Moreover, I/O scheduling is also known as disk scheduling. Disk scheduling is a gradually significant aspect of operating system research.