Explain difference between security and protection, Computer Engineering

Explain difference between Security and Protection?

Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data.

(a) Access controls lists (ACL's) (b) Capability lists (C- lists)

These lists are utilized to make sure that uses only access files that are explicitly authorized access. These files contain

(i) files created by a user herself/himself

(ii) files owned by others, for that a user process explicit access privileged granted through other owners.

Security mechanisms: Authentication is the main security mechanism. Authentication is the function of verifying the identity of a user. Authentication is classically performed by passwords at login time. The system stores the password information into a system as place as pair of the form (password info, user id), the password information is protected through encryption.

 

Posted Date: 5/9/2013 1:54:41 AM | Location : United States







Related Discussions:- Explain difference between security and protection, Assignment Help, Ask Question on Explain difference between security and protection, Get Answer, Expert's Help, Explain difference between security and protection Discussions

Write discussion on Explain difference between security and protection
Your posts are moderated
Related Questions
Explain Gray Code Ans. Gray Code 1.  Extremely useful code. Also termed as reflected code. 2.  All gray code is different from the preceding and succeeding codes thr

Explain The Boolean Equations for Logic Circuits? A Boolean equation is the mathematical representation of a logic circuit using standard Boolean terms. All the logic gates (AND,

What is processor time of a program? The periods during which the processor is active is known as processor time of a program it depends on the hardware included in the executi

How does an authentication system be different from a firewall into functioning? Authentication verses firewall User Authentication and Authorization A significan

Explain Tri-state logic inverter with the help of a circuit diagram. Give its Truth Table. Ans: Tri-state Logic Inverter: The functional diagram of Tri-state Logic Inve

How can you provide an alternating color scheme in a Repeater control?  AlternatingItemTemplate Like the ItemTemplate element, but rendered for every otherrow (alternating item

Unencoded micro-instructions One bit is required for each control signal; so number of bits needed in a micro-instruction is high. It represents a detailed hardware vi

If for a short period of time circuits goes to some dissimilar logic level then it is assumed to have then it is known as static hazard e.g. If the final logic value of output of a

Which language  is a platform free language Java language

Write explanatory notes on Microprocessor development system. Microprocessor development system: Computer systems have undergone many changes recently. Machines which once fi