Explain difference between security and protection, Computer Engineering

Explain difference between Security and Protection?

Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data.

(a) Access controls lists (ACL's) (b) Capability lists (C- lists)

These lists are utilized to make sure that uses only access files that are explicitly authorized access. These files contain

(i) files created by a user herself/himself

(ii) files owned by others, for that a user process explicit access privileged granted through other owners.

Security mechanisms: Authentication is the main security mechanism. Authentication is the function of verifying the identity of a user. Authentication is classically performed by passwords at login time. The system stores the password information into a system as place as pair of the form (password info, user id), the password information is protected through encryption.


Posted Date: 5/9/2013 1:54:41 AM | Location : United States

Related Discussions:- Explain difference between security and protection, Assignment Help, Ask Question on Explain difference between security and protection, Get Answer, Expert's Help, Explain difference between security and protection Discussions

Write discussion on Explain difference between security and protection
Your posts are moderated
Related Questions
We perform load testing once we are completed with interface (GUI) testing. Modern system architectures are large and difficult. Whereas one user testing primarily on functionality

Q. What is communication Displays and Matrix? Communication Displays Communication displays offer support in concluding frequency of communication whether congestion in me

Adavantages and disadvantages of compilers and interpreters

Q. Describe about Address Space and Memory Space? An address used by a programmer will be termed as a virtual address and set of such addresses the address space. An address in

Microprocessor development system Computer systems have undergone many changes recently. Machines that once filled large areas have been reduced to small desktop computer syste

Example Calculation: If we see an example we are working with a set of examples like S = {s 1 ,s 2 ,s 3 ,s 4 } categorised with a binary categorisation of positives and negati

What will exactly the hide statement do? For displaying the details on secondary lists needs that you have previously stored the contents of the selected line from within the

After going through details of device interfaces next point to be discussed is how the interface can be used to support I/O from devices. Binary information received from an extern

The combinational circuits employ the comparators for comparing the numbers and storing them on the basis of maximum and minimum functions. Likewise in the interconnection networks

does matlab contain procedures for knoledge representation? if yes where can i find it?