Differentiate between protection and security, Computer Engineering

Assignment Help:

Differentiate between Protection and Security

Operating system contains a collection of objects, hardware or software. Every object has a unique name and can be accessed via a well-defined set of operations. Protection problem - make sure that each object is accessed correctly and just only by those processes that are permitted to do so.   

 Security must refer external environment of the system, and protect it from:

a) Unauthorized access.

b) Malicious modification or destruction

c) Accidental introduction of inconsistency.

It is very easy to protect against accidental as compared to the malicious misuse.

The meaning of Protection of user files is that file owner or creator should be capable to control:

What can be done and by whom. Several categories of access to files are:

a) Read

b) Write

c) Execute

d) Append

e)Delete

f) List    

 


Related Discussions:- Differentiate between protection and security

Microprocessor, overlapping segmentation process in 8086

overlapping segmentation process in 8086

Develop a simple patient management system, In the first part of Assignment...

In the first part of Assignment 2A you will develop a simple Patient class, representing an Patient who is to be admitted for a minor procedure that only requires a 1-2 day stay in

What are the techniques of data collection, What are the techniques of Data...

What are the techniques of Data Collection It can be either automatic or manual. Manual techniques can include: -  Keypads/Keyboards to type in data -  touch screens to s

What is driver software, Driver software is software that works as a transl...

Driver software is software that works as a translator among another program and some piece of hardware. In the software industry, there are commonly standard ways to do things. Th

Physical characteristics and access mode of disk drive, Q. Physical charact...

Q. Physical characteristics and access mode of disk drive? Access Time: Access time is time needed between requests made for a read or write operation until the time data are

What is component diagrams in uml, A component diagram is mainly useful wit...

A component diagram is mainly useful with teams of larger size. UML components are great to perform architectural landscape for an exact system. The component diagram permits to mo

Is the address bus unidirectional, The address bus is unidirectional due to...

The address bus is unidirectional due to the address information is always given by the Micro Processor to address a memory location of an input or output devices.

Explain gray code, Explain Gray Code Ans. Gray Code 1.  Extreme...

Explain Gray Code Ans. Gray Code 1.  Extremely useful code. Also termed as reflected code. 2.  All gray code is different from the preceding and succeeding codes thr

Explain keyboard input and video output, Q. Explain Keyboard Input and Vide...

Q. Explain Keyboard Input and Video output ? A Keystroke read from keyboard is termed as a console input and a character displayed on the video screen is known as a console out

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd