Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Term Paper:
One of the main drawbacks of the user authentication is the essence of various attacks to the protection mechanism. The concept of user authenticity is weak and susceptible to numerous attacks. The protection mechanism also relates to the ability of the user to maintain the user ID and password secret for the purposes of minimizing threats and attacks (Weber 2010). This is an indication that the users must have the right memory and the ability to keep the essentials secret with the aim of reducing external threats thus enhancing the validity and integrity and availability of the information within the context of the user's computer system.
It is ideal to note that the authenticity mechanism is ineffective in relation to making financial transactions remotely. This focus on the making of fund transfers though the concept of the internet banking channel. There is an increase in cost of utilization of this protection mechanism because of the influence of complex user ID and password. This indicates the essence of resetting the password or locking the authentication process following a certain number of failing attempts. The user authentication protection mechanism is susceptible to piracy thus external threats and attacks. This makes it a loophole towards enhancing effectiveness and efficiency in the implementation of the operations and directives of the policies in accordance with the needs and objectives of the developers of the operating systems.
This protection mechanism is also known as the concept of the access control matrix. It refers to the concept of the resource protection or a model for the purposes of protection of the operating system. The mechanism was first applied in 1971 under the influence of an American computer scientist known as Butler Lampson (Tripunitara et al., 2007). The protection scheme of the protection model in context focuses on the limitation of unauthorized users or subjects to utilize or exploit resources such as operating systems. This is an indication that a particular or specific subject or user has limited access rights or complete accessing rights in relation to the policies and directives of the developers. The access control matrix focuses on the utilization of the concept of the locked doors thus the opportunity for utilization by the individuals or users with the right keys. This expression also relates to the concept of the movie tickets that allows those with valid movie tickets to pass through the door and watch their favorite movies. There are derivative forms of access control matrix in the form of access control list and the capability list essential in the provision of maximum protection for the operating system. The derivatives have some benefits or advantages as well as disadvantages towards execution of the needs and preferences of the users with the purpose of enhancing the protection of the operating system.
The access control matrix is an effective approach towards enhancing protection of the operating system through the utilization of triple parts in the form of object, subject, and access operation. An object refers to the passive entity or system resource in relation to aspects such as file, directory, printer, and database records. On the other hand, the subject refers to the active entity within the computer system in the form of user, program, thread, and process. The matrix focuses on the utilization of the access operations essential or responsible for the interactions between the objects and the subjects following the implementation of complex technologies. The user first has access the request under the influence of the reference monitor for the end product in the form of grants or denial of access thus protection of the operating system through external attacks or utilization by unauthorized subjects or others. This mechanism focuses on the implementation of four critical principles towards the achievement of the goals and objectives. The first principle in relation to implementation of the access matrix is the assignment of the subjects of the operating system. The second principle focuses on assigning the objects recognized by associating programs within the context of the operating system for the purposes of compatibility. The third principle relates to assigning of the access operations that the subjects can utilize. The final principle is the opportunity to assign subjects which interact with the objects through integration of the processes within the context of the operating system. The effectiveness of the access matrix relates to the ability of the user to implement the protection mechanism effectively and efficiently.
There are various benefits in relation to the implementation of the access matrix with reference to the protection of the operating system. The main advantage is the ability to the mechanism to limit the operations or actions of the legitimate user effectively and efficiently. This is through constraining what the users can do directly and programs the operating system can execute on behalf of the user while exploiting the essential resources or systems (Shakya et al., 2011). This is vital in the prevention of activities that could lead to the breach of the security. Access control is also an effective and efficient approach for the achievement of confidentiality, integrity, and availability objectives and targets. This is critical in the provision of sufficient protection to the existing or underlying operating system in relation to the complex modern technologies. Implementation of the derivative of the access matrix in the form of the ACL (access control list) makes it easier to determine the modes of access subjects authorized currently for the particular object.
It is also easy to revoke all access to an object with the aim of enhancing the protection of the operating system with the aim of preventing external attacks or intrusion by unauthorized user. It is easier to find accesses in relation to the responsibilities or actions the subject is authorized to perform. This relates to the ability of the derivate of the access matrix in the form of capabilities. There is also the essence of flexibility and effectiveness in addressing protective needs and obligations in the context of the operating systems. Access matrix has the ability to address diverse needs through implementation of the concept of the subject and objects in the development of interactive operations (Besson et al., 2010). This makes it ideal for the utilization in enhancing protection to the operating systems in the modern society in relation to the complex elements within the context of the complex computer systems.
Despite the overwhelming benefits, there are some disadvantages in relation to the access matrix as a protective mechanism to the operating system in the context of the modern computer systems. One of the main disadvantages in associated with implementation of the capabilities derivative is difficulty in finding all subjects with the same kind of access offered to a specific object (Ya-Fen et al., 2007). This makes it difficult for the users to utilize the aspects effectively and efficiently in addressing their needs and preferences. It is also difficult to determine all accesses a subject has for the purposes of maximization of the available opportunities in relation to the complex computer systems in the modern society associated with advanced technologies.
Operating systems are the main components towards realization of effective and efficient presentation and operation of the computer systems. There is a need to prevent intrusion of malicious attackers, threats, and unauthorized users. There are components or protective mechanisms towards implementation of effective and efficient protection of the operating system. This research focused on the examination of three mechanisms: access matrix, language-based, and user authentication protective mechanism. Access matrix offers efficiency, flexibility, and effectiveness in controlling operations of the user. The language-based protection mechanism and user authentication are less expensive, flexible, and effective in addressing the needs and objectives of the users.
Ya-Fen, C., & Chin-Chen, C. (2007). Tolerant Key Assignment for Enforcing Complicated
Access Control Policies in a Hierarchy. Fundamenta Informaticae, 76(1/2), 13-23.
Besson, F., Dufay, G., Jensen, T., & Pichardie, D. (2010). Verifying resource access control on mobile interactive devices. Journal of Computer Security, 18(6), 971-998.
Shakya, I.L., Ali, F.H., & Stipidis, E.E. (2011). High user capacity collaborative code-
division multiple access. IET Communications, 5(3), 307-319.
Tripunitara, M.V., & Ninghui, L. (2007). A theory for comparing the expressive power of access control models. Journal of Computer Security, 15(2), 231-272.
The Benefits of Capability-based Protection. (2012). Communications of the ACM, 55(3), 96.
Harrison, M.A., Ruzzo, W.L., Ullman, J.D., & Gaines, R.S. (2006). Protection in Operating Systems. Communications of the ACM, 19(8), 461-471.
Rossbach, C.J., Ramadan, H.E., Hofmann, O.S., Porter, D.E., Bhandari, a., & Witchel, E.
(2008). TxLinux and MetaTM: Transactional Memory and the Operating System.
Communications of the ACM, 51(9), 83-91.
Sharairi, J. (2011). Factors Affecting the Role of Internal Auditor in the Protection of Computerized Accounting Information Systems from Electronic Penetration (a Field
Study on Banks Operating in Jordan). International Research Journal of Finance & Economics, (68), 140-160.
M. Watson, R.N. (2013). A Decade of OS Access-Control Extensibility. Communications of
The ACM, 56(2), 52-63. doi:10.1145/2408776.2408792
Weber, L., & Lawrence, P. (2010). Authentication…[continue]
"Operating System Discuss The Relative" (2013, June 26) Retrieved October 24, 2016, from http://www.paperdue.com/essay/operating-system-discuss-the-relative-92508
"Operating System Discuss The Relative" 26 June 2013. Web.24 October. 2016. <http://www.paperdue.com/essay/operating-system-discuss-the-relative-92508>
"Operating System Discuss The Relative", 26 June 2013, Accessed.24 October. 2016, http://www.paperdue.com/essay/operating-system-discuss-the-relative-92508
Windows 7 Operating System Guide to Operating Systems The role of operating systems continues to be critical to the overall performance of enterprise information systems globally. In the majority of enterprises today there is a wide variation in the type of operating systems used, as the information needs vary significantly across organizations. The intent of this analysis is to evaluate the Microsoft Windows XP, Windows 7 and Linux operating systems. The architectures,
system development life cycle (SDLC) approach to the development of Information Systems and/or software is provided. An explanation of SDLC is offered, with different models applied in implementing SDLC delineated. Advantages and disadvantages associated with each of the models will be identified. System Development Life Cycle According to Walsham (1993), system development life cycle (SDLC) is an approach to developing an information system or software product that is characterized by a
RIM Discuss this product in terms of its repositioned target market demographics using U.S. Census Data. In regards to U.S. Census Data, the target market demographic show promise. The repositioned product will focus on high level and medium income level people. These individuals tend to be high lifestyle and business professionals. The product is full of applications and latest operating system that is helpful for professionals and other business persons to accomplish
This category can further be divided into six subgroups namely; short-range, medium range, long-range, close range, endurance, Medium Altitude Long Endurance (MALE) Unmanned Aerial Vehicles (UAVs). The long-range UAVs are technologically more advanced as they use satellites in order to overcome the communication problem between the UAVs and the ground stations. This communication problem is generally caused by the curvature of the earth. The medium, short and close range
accounting systems, their tradeoffs, and discusses the differences between countries in their approaches. Each of the cost accounting systems discussed in the articles accomplishes some management goals better than other systems, but there are tradeoffs involved with each. Different nations approach their cost accounting systems differently due at least in part to differences within cultures. For instance, GPK is more suited to countries where the culture is one of uncertainty
It was then important to see the degree at which technology and training played a role in combating each fire. 1.2.4.Rationale of the Study What is that can be gained from this study? The reasoning behind such a study is born out of a need to provide better training for fire fighters so that fire management systems will improve and reduce the amount of loss due to the fire. By studying
According to Paul B. Mckimmy (2003), "The first consideration of wireless technology is bandwidth. 802.11b (one of four existing wireless Ethernet standards) is currently the most available and affordable specification. It allows a maximum of 11 megabits per second (Mbps)" (p. 111); the author adds that wired Ethernet LANs are typically 10 or 100 Mbps. In 1997, when the IEEE 802.11 standard was first ratified, wireless LANs were incompatible and