Preview

Protection and Security

Powerful Essays
Open Document
Open Document
1598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Protection and Security
Protection and Security

The separation of protection and security is a design choice. Protection is identified as a mechanism, which means that it is a device that changes an input into a desired output. Security is identified as a policy, which is a procedure to guide the decision making process. Security relies on the protective mechanisms along with cryptology techniques. Protection has security policies that are supported by protective mechanisms and decides which information a user can access within the system. Another type of protection is available by UNIX security, which allows the system to be protected by or from other users. The UNIX security is more about protection than actual security; it is for users and groups.
Another form of protection is the take-grant protection model that is used to disprove the safety of a system that follows specific rules. There are four rules which is the take rule, grant rule, create rule, and the remove rule. The take rule revokes the privileges of another object. The grant rule gives the authority to a subject in order to apply its rights to an object. The create rules grants a subject the ability to form new objects. The remove rule gives a subject the authority to revoke the rights that it has applied on another object. Security is defined is 5 aspects:
“• unauthorized reading of information
• unauthorized modification of information
• unauthorized destruction of data
• unauthorized use of resources
• denial of service for authorized uses”

Information security deals with the defense against improper use or access of information. There are two types of information security, there is IT security and there’s information assurance. IT security is a security applied to electronics with processors, such as hand held devices. It is also responsible for helping defend against cyber attacks that attempt to gain access to private information of large companies or the likes.

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Army Regulation 190–51

    • 37089 Words
    • 149 Pages

    o Consolidates paragraphs 6 through 9, 11, 13, 15 through 17, and 19 of AR 190-18…

    • 37089 Words
    • 149 Pages
    Powerful Essays
  • Better Essays

    Questions 641 Answers

    • 1208 Words
    • 6 Pages

    For the five examples given, explain what each one protects in the first column and what it Doesn’t protect in the second column.…

    • 1208 Words
    • 6 Pages
    Better Essays
  • Good Essays

    File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. In this paper, the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file will be use. The question to be answered is of how to specify this protection scheme in UNIX. It is very important to set up a protection scheme that will allow control access and viewing privileges of specific files to a number of different users. It is also a necessary task to ensure the integrity of…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers - INTEGRITY…

    • 868 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4222 229 Outcome 2

    • 119 Words
    • 1 Page

    -The Safeguarding Act –ensures the importance of policies and procedures are put into place to protect the service user.…

    • 119 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    safeguarding

    • 4973 Words
    • 29 Pages

    this workbook, you are learning about the different things that make up your job role.…

    • 4973 Words
    • 29 Pages
    Good Essays
  • Good Essays

    safeguarding

    • 2007 Words
    • 6 Pages

    Protection is to give the individual help and support to report abuse. It is also to allow the individual to get involved in the safeguarding process as much as they are able. We also have effective ways of assessing and managing risks.…

    • 2007 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    Appraise the issues raised in the article by Moglen (2013) as they affect individuals, organizations and society…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Online Grading System

    • 351 Words
    • 2 Pages

    3. To design a system that is secured which cannot be modified or retrieved by unauthorized person.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays