Integrity is the prevention of unauthorized users. Availability is the prevention of unauthorized withholding of information or resources. The external threats can be of two types as direct threats and indirect threats. A direct threat is an attack on the system from a hacker or a disgruntled insider.
An indirect threat is a random attack such as a computer virus , worm, Trojan horse, etc. Protection is a method used in operating systems that manages threats within the system to maintain the proper functioning of the system. Security is a method used in operating systems that handles the threats from outside of the system to maintain the proper functioning of the system.
This constitutes the basic difference between protection and security. The main difference between protection and security is that while protection focuses on internal threats of the system, security focuses on external threats to the system.
Protection provides a mechanism for controlling the access to programs, processes, and user resources. Security provides a mechanism to safeguard the system resources and user resources from external users. Another difference between protection and security is their policy. Basic Security Protection Basic Provides the system access to the legitimate users only. Controls the access to the system resources.
Handles More complex concerns. Quite simple queries. Policy Describes which person is allowed to use the system. Specifies what files can be accessed by a particular user. Type of threat involved External Internal Mechanism Authentication and encryption are performed. Set or alter the authorization information. The security of a system revolves around the external environment, and it also requires an appropriate protection system.
The security systems include the protecting of the computer resources against unauthorized access, malicious alteration and inconsistency. This deals with identifying each user in the system and making sure they are who they claim to be. The operating system makes sure that all the users are authenticated before they access the system. The different ways to make sure that the users are authentic are:. Each user has a distinct username and password combination and they need to enter it correctly before they can access the system.
The users need to punch a card into the card slot or use they individual key on a keypad to access the system. Different user attribute identifications that can be used are fingerprint, eye retina etc. These are unique for each user and are compared with the existing samples in the database. The user can only access the system if there is a match. These passwords provide a lot of security for authentication purposes. It determines that what files can be accessed or permeated by a special user.
The protection of the system should confirm the approval of the process and users. Due to this, these licensed users and processes will care for the central processing unit, memory and alternative sources. The protection mechanism ought to provide a path for specifying the controls to be obligatory, beside how of implementing them.
Skip to content. Change Language.
0コメント