Computer Science Homework Help

Ashford University Week 5 Operating Systems Goals of Protection Discussion

 

part 1 

Prior to completing work on this interactive assignment, read the following sections in your textbook: 13.1 to 13.4 and 13.10 in Chapter 13: Protection and 14.1 to 14.3, 14.5, and 14.10 in Chapter 14: Security. In addition, answer the following exercises: 13.1, 13.5, and 13.10. Solutions to the Practice Exercises can be accessed via the textbook website: Chapter 13.

You will be including revised content from this interactive assignment in your OS Theory Concept Map final assignment. Prior to completing work on this interactive assignment, you may wish to review the instructions included for the OS Theory Concept Map final assignment later in Week 5 to see how it fits into your overall final project.

To complete this week’s interactive assignment, you will continue building the OS Theory Concept Map by addressing the following topics concerning mechanisms necessary to control the access of programs, processes, or users:

  • Outline the goals and principles of domain- and language-based protection in a modern computer system, and describe how an access matrix is used to protect specific resources a process can access. (Consider using a matrix representation to illustrate concepts.)
  • Describe how security is used to protect programs, systems, and networks from threats.

Logically arrange the essential concepts about protection and security into a hierarchy of nodes that branch from the main idea. Include cross-links where necessary to show relationships in different sections of the concept map. Use connecting nodes to accurately describe each relationship between topics that connect. Section 5 must have at least two nodes and three connecting nodes.

After completing Section 5 of the concept map, ost a link to your OS Theory Concept Map in the discussion forum for your peers to review.

part 2 

Prior to beginning work on this discussion, read the following sections in your textbook: 13.1 to 13.4 and 13.10 in Chapter 13: Protection. In addition, answer the following exercises: 13.1, 13.7, and 13.10. Solutions to the Practice Exercises can be accessed via the textbook website: Chapter 13.

For your initial post, consider the following scenario:

  • You are tasked with setting up protection within a new project, and you are trying to decide on a formal security model to protect the resources (e.g., files). The two options are to implement an access matrix using the following:
    • Access lists that are associated with objects.
    • Capabilities that are associated with domains.

Compare the strengths and weaknesses of each type of implementation. Provide rationale for your statements based on your sources.