Explain difference between security and protection, Computer Engineering

Explain difference between Security and Protection?

Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data.

(a) Access controls lists (ACL's) (b) Capability lists (C- lists)

These lists are utilized to make sure that uses only access files that are explicitly authorized access. These files contain

(i) files created by a user herself/himself

(ii) files owned by others, for that a user process explicit access privileged granted through other owners.

Security mechanisms: Authentication is the main security mechanism. Authentication is the function of verifying the identity of a user. Authentication is classically performed by passwords at login time. The system stores the password information into a system as place as pair of the form (password info, user id), the password information is protected through encryption.

 

Posted Date: 5/9/2013 1:54:41 AM | Location : United States







Related Discussions:- Explain difference between security and protection, Assignment Help, Ask Question on Explain difference between security and protection, Get Answer, Expert's Help, Explain difference between security and protection Discussions

Write discussion on Explain difference between security and protection
Your posts are moderated
Related Questions
Applications Of Parallel Processing Parallel computing is an development of serial computing that effort to emulate what has always been the affirm of affairs in the natural wo

Write an assembly program to simulate a microwave

The search method for searching a sorted file that needs increased amount of space is The search technique for searching a sorted file that needs increased amount of space

This question can be answered either with respect to English or with respect to a language other than English. (If you you are not a native speaker of the language of your choice,

Write the truth table for a clocked J-K flip-flop that is triggered by the positive-going edge of the clock signal. Explain the operation of this flip-flop for the following condit

An amplifier has an input resistance of 600 ohms and a resistive load of 75 ohms. When it has an rms input voltage of 100 mV, the rms output current is 20mA. Find the gain in dB.

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

What is a Process Scheduling? Scheduling is a key element of the workload management software that usually performs several or all of: Queuing Scheduling Monito

Determine the primary memory of the server The keys used for accessing the server are held at a secret location in the primary memory of the server. This area or location is hi

create a BCD adder combinational ckt. that adds 2 digit BCD inputs