The concept of user authenticity is weak and susceptible to numerous attacks. The protection mechanism also relates to the ability of the user to maintain the user ID and password secret for the purposes of minimizing threats and attacks (Weber 2010). This is an indication that the users must have the right memory and the ability to keep the essentials secret with the aim of reducing external threats thus enhancing the validity and integrity and availability of the information within the context of the user's computer system.
It is ideal to note that the authenticity mechanism is ineffective in relation to making financial transactions remotely. This focus on the making of fund transfers though the concept of the internet banking channel. There is an increase in cost of utilization of this protection mechanism because of the influence of complex user ID and password. This indicates the essence of resetting the password or locking the authentication process following a certain number of failing attempts. The user authentication protection mechanism is susceptible to piracy thus external threats and attacks. This makes it a loophole towards enhancing effectiveness and efficiency in the implementation of the operations and directives of the policies in accordance with the needs and objectives of the developers of the operating systems.
Access Matrix
This protection mechanism is also known as the concept of the access control matrix. It refers to the concept of the resource protection or a model for the purposes of protection of the operating system. The mechanism was first applied in 1971 under the influence of an American computer scientist known as Butler Lampson (Tripunitara et al., 2007). The protection scheme of the protection model in context focuses on the limitation of unauthorized users or subjects to utilize or exploit resources such as operating systems. This is an indication that a particular or specific subject or user has limited access rights or complete accessing rights in relation to the policies and directives of the developers. The access control matrix focuses on the utilization of the concept of the locked doors thus the opportunity for utilization by the individuals or users with the right keys. This expression also relates to the concept of the movie tickets that allows those with valid movie tickets to pass through the door and watch their favorite movies. There are derivative forms of access control matrix in the form of access control list and the capability list essential in the provision of maximum protection for the operating system. The derivatives have some benefits or advantages as well as disadvantages towards execution of the needs and preferences of the users with the purpose of enhancing the protection of the operating system.
The access control matrix is an effective approach towards enhancing protection of the operating system through the utilization of triple parts in the form of object, subject, and access operation. An object refers to the passive entity or system resource in relation to aspects such as file, directory, printer, and database records. On the other hand, the subject refers to the active entity within the computer system in the form of user, program, thread, and process. The matrix focuses on the utilization of the access operations essential or responsible for the interactions between the objects and the subjects following the implementation of complex technologies. The user first has access the request under the influence of the reference monitor for the end product in the form of grants or denial of access thus protection of the operating system through external attacks or utilization by unauthorized subjects or others. This mechanism focuses on the implementation of four critical principles towards the achievement of the goals and objectives. The first principle in relation to implementation of the access matrix is the assignment of the subjects of the operating system. The second principle focuses on assigning the objects recognized by associating programs within the context of the operating system for the purposes of compatibility. The third principle relates to assigning of the access operations that the subjects can utilize. The final principle is the opportunity to assign subjects which interact with the objects through integration of the processes within the context of the operating system. The effectiveness of the access matrix relates to the ability of the user to implement the protection mechanism effectively and efficiently.
There are various benefits in relation to the implementation of the access matrix with reference to the protection of the operating system. The main advantage is the ability to the mechanism to limit the operations or actions of the legitimate user effectively and efficiently. This is through constraining what the users can do directly and programs the operating system can execute on behalf of the user while exploiting the essential resources or systems (Shakya et al., 2011). This is vital in the prevention of activities that could lead to the breach...
Windows 7 Operating System Guide to Operating Systems The role of operating systems continues to be critical to the overall performance of enterprise information systems globally. In the majority of enterprises today there is a wide variation in the type of operating systems used, as the information needs vary significantly across organizations. The intent of this analysis is to evaluate the Microsoft Windows XP, Windows 7 and Linux operating systems. The architectures,
RIM Discuss this product in terms of its repositioned target market demographics using U.S. Census Data. In regards to U.S. Census Data, the target market demographic show promise. The repositioned product will focus on high level and medium income level people. These individuals tend to be high lifestyle and business professionals. The product is full of applications and latest operating system that is helpful for professionals and other business persons to accomplish
Economics Discuss the alternative theories to profit maximization ranging from perfect competition to strict monopolies and discuss how these two special conditions are theoretical limits In economics, profit maximization is the process by which a firm determines the price and output level that returns the greatest profit. There are several approaches to this problem. The total revenue -- total cost method relies on the fact that profit equals revenue minus cost, and
Of the many theories and concepts that seek to define long-term learning effectiveness and context, the three factors of autonomy, mastery and purpose are by far the most pervasive in practical, empirical research results (Albright, Burgess, Davis, 2011). Creating and operating a team learning environments begins by deliberately designing in autonomy, mastery and purpose to ensure the motivation to attain long-term learning is achieved. This is however a secondary concern
S. "increased its production of goods and services in the first few months of 2009…Alone among the developed nations that belong to G-20, it was not being sucked into a world recession" (Stutchbury 2010). Its currency even reached parity with the U.S. One unique facet of Australia's economy not present in the other developed nation that were hard-hit by the credit crisis is the expansion of its mining sector. In the
Kaizen is so engrained in the Toyota culture and the corresponding House of Quality that internally when planned results are not achieved it is considered more of a failure of process and execution (Gong, Wang, Lai, 2009). This is where the TPS varies significantly from American-based approaches to managing variation in results and failure to attain results as well. The Kaizen approach systematically analyzes why a process did not
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now