Preview

Protection and Security

Powerful Essays
Open Document
Open Document
1598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Protection and Security
Protection and Security

The separation of protection and security is a design choice. Protection is identified as a mechanism, which means that it is a device that changes an input into a desired output. Security is identified as a policy, which is a procedure to guide the decision making process. Security relies on the protective mechanisms along with cryptology techniques. Protection has security policies that are supported by protective mechanisms and decides which information a user can access within the system. Another type of protection is available by UNIX security, which allows the system to be protected by or from other users. The UNIX security is more about protection than actual security; it is for users and groups.
Another form of protection is the take-grant protection model that is used to disprove the safety of a system that follows specific rules. There are four rules which is the take rule, grant rule, create rule, and the remove rule. The take rule revokes the privileges of another object. The grant rule gives the authority to a subject in order to apply its rights to an object. The create rules grants a subject the ability to form new objects. The remove rule gives a subject the authority to revoke the rights that it has applied on another object. Security is defined is 5 aspects:
“• unauthorized reading of information
• unauthorized modification of information
• unauthorized destruction of data
• unauthorized use of resources
• denial of service for authorized uses”

Information security deals with the defense against improper use or access of information. There are two types of information security, there is IT security and there’s information assurance. IT security is a security applied to electronics with processors, such as hand held devices. It is also responsible for helping defend against cyber attacks that attempt to gain access to private information of large companies or the likes.

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats. Information security is composed of computer security and communications security. Also called…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. In this paper, the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file will be use. The question to be answered is of how to specify this protection scheme in UNIX. It is very important to set up a protection scheme that will allow control access and viewing privileges of specific files to a number of different users. It is also a necessary task to ensure the integrity of…

    • 699 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Army Regulation 190–51

    • 37089 Words
    • 149 Pages

    o Consolidates paragraphs 6 through 9, 11, 13, 15 through 17, and 19 of AR 190-18…

    • 37089 Words
    • 149 Pages
    Powerful Essays
  • Better Essays

    Questions 641 Answers

    • 1208 Words
    • 6 Pages

    For the five examples given, explain what each one protects in the first column and what it Doesn’t protect in the second column.…

    • 1208 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers - INTEGRITY…

    • 868 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    safeguarding

    • 4973 Words
    • 29 Pages

    this workbook, you are learning about the different things that make up your job role.…

    • 4973 Words
    • 29 Pages
    Good Essays
  • Good Essays

    Safeguarding

    • 620 Words
    • 3 Pages

    Leaving individuals in wet or soil clothing or bedding as a deliberate act to demonstrate power and strength of the…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    safeguarding

    • 2007 Words
    • 6 Pages

    Protection is to give the individual help and support to report abuse. It is also to allow the individual to get involved in the safeguarding process as much as they are able. We also have effective ways of assessing and managing risks.…

    • 2007 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Safeguarding

    • 2781 Words
    • 9 Pages

    P4/ Outline key legislation and regulations which govern safeguarding adults work. In this part of the assignment I will be stating the main key points of each piece of legislation and how it is applied in practice. Safeguarding Vulnerable Adults 2006This piece of legislation was introduced on the 8th November 2006, the whole idea of this act is to protect adults who are at risk of abuse due to a vulnerability. For example, someone with Down syndrome may be more at risk of getting abused due to their lack of social skills and knowledge. The key points of this legislation are~…

    • 2781 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    Appraise the issues raised in the article by Moglen (2013) as they affect individuals, organizations and society…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Online Grading System

    • 351 Words
    • 2 Pages

    3. To design a system that is secured which cannot be modified or retrieved by unauthorized person.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays