Tugasan 4
Present about operating system protection and security. Explain and recognize security policy and mechanism, authentic basic also protection concept and access control.
definition of policy in system security is “what is allowed and what is not allowed“. And the respective mechanisms enforces policies. There are three goals of security: to prevent attackers from violating security policies, to detect attackers who are violating security policies, and to recover which stops the violation and repairs damage. The last one also includes the ability to function after being attacked.
There are three types of mechanisms. Secure, Precise, and Broad states. In a secure state mechanism, we allow the reachable states to be within a subset of reachable state. Therefore we provide extra security in this mechanism. In a precise state, we allow reachable states to go to all the secured states. That is to say that a user is allowed to go to all secured state and the number of reachable and secured state is the same, in other words, precise. In a broad state, we allow the user to go to an unsecured state and then a set of secured state. This is the most vulnerable mechanism.
In order to ponder on these issues we take a lot of things into consideration. We should determine the cost benefit of if it is cheaper to recover or to prevent. We should also do a risk-analysisWe should also keep the law and customs in mind, we should know if certain security measures are within the law or not, or would people even use these security measures.
Recognize security policy and mechanism.
· In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple definition of a security policy is "to set who may use what information in a computer system.
· mechanism for controlling the access of programs, processes, or users the resources defined by the computer system. the protentation mechanism ensures the enforcement of a certain policy.
Elaborate authentic basic
Password
· A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.
Artifact
· In natural science and signal processing, an artifact is any error in the perception or representation of any visual or aural information introduced by the involved equipment or technique(s).
· In computer science, digital artifacts are anomalies introduced into digital signals as a result of digital processing.
· In microscopy, artifacts are sometimes introduced during the processing of samples into slide form. See Artifact (microscopy)
Biometric
· Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.
Elaborate protection concept and access control
· For your PC security suite is now available a variety of programs that promise more often than full protection from malware, with acontrol virus and malware, but also with some research andcomplex in real time.
· Major challenge for all manufacturers areoffering solutions that are effective yet easy to use, and if you do not require excessive resources to the system.
· At the time all the leading manufacturers of security software suite that provides a guide as well as the traditional functions of malwaredetection and protect your PC also features accessories forprotection of data and optimization of the operating system.
· The concept of security was also extended to the area where this malware is not in the strict sense. But, in a sense, a proper backup data fall within the concept of security.
No comments:
Post a Comment