Explore BrainMass
Share

Operating Systems

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Discuss the relative advantages and disadvantages of at least three different measures used to protect operating systems. The ease of implementation and the associated security management issues should also be addressed.
- What are some measures used for operating systems security?
- What are the different operating systems, and can the security measures be used for each system?

Please also provide some references for this.

© BrainMass Inc. brainmass.com October 25, 2018, 5:45 am ad1c9bdddf
https://brainmass.com/computer-science/computer-system-implementation/operating-systems-433653

Solution Preview

Operating system protection means the mechanism for controlling the access of programs, processes or users to the resources defined by the computer system. The protection measures or mechanisms ensure the enforcement of a certain policy. This policy is established in several ways; through- system design, system management and user defined. A computer system is a collection of processes and objects- each of which has a unique name and can be accessed through a well-defined set of operations [1] [2]. However, there are different measures which are taken to protect the operating system so that it can protect from malicious attacks and/or various unwanted situations related with user data safety and security [1]. We have discussed here some of the protection measures and their relative advantages and disadvantages.

Access Control Matrix: Access control matrix or access matrix is an abstract, formal security model of protection state in computer systems, which characterize the rights of each subject with respect to every object in the system. Theoretically, it is a table in which each row represents a subject, each column represents an object, and each entry is the set of access rights for that subject to that object. In general, the access control matrix is sparse: most subjects do not have access rights to most objects. Therefore, different representations have been proposed. With implementing the access matrix model within a system, the protection state of any system can be defined through the privileges possessed by specific object. Such security system provides a framework that defines the dynamics of the protection state of such system [3].

Access-control model provides specific constraints that can restrict users from what they can do within any system and also restrict the program execution on behalf of the system's users to access system resources within the limit defined by the Access-Control-Matrix model. The purpose of such model is to limit the actions or the operations that an authorized user can perform within the system. It defines the access rules of authenticated users where the assumption that is made by such model where authentication is verified successfully prior enforcing the access control rules [4].

Advantages and disadvantages:
Advantages:
*) Access-Matrix control model can be a base ground for any permissions access control system; that can be used to apply protection since the model is used as an abstract model of permissions [3].
*) Access-Matrix control model provide the flexibility required for users to specify how other users can access the system ...

Solution Summary

Operating system protection means the mechanism for controlling the access of programs, processes or users to the resources defined by the computer system. The protection measures or mechanisms ensure the enforcement of a certain policy. This policy is established in several ways; through- system design, system management and user defined. A computer system is a collection of processes and objects- each of which has a unique name and can be accessed through a well-defined set of operations [1] [2]. However, there are different measures which are taken to protect the operating system so that it can protect from malicious attacks and/or various unwanted situations related with user data safety and security [1]. We have discussed here some of the protection measures and their relative advantages and disadvantages.

Kindly refer to the attached file for detailed solution.

$2.19
See Also This Related BrainMass Solution

Information Systems Management..

•I need help with analyzing the provided information on Apple Computers. In particular, please update the information by additional research to include Apple's newer product lines, its competitors, and recent events, and decide the lessons that have been learned for enterprise information systems managers, in a report. To update the case you will want to look at recent news as well. There are problems with Apple if you look underneath the hood. For example, they have had a lot of bugs with their operating system upgrades. IOS8 was a major failure. What lessons did Apple learn form that? Apple is always in a legal dispute with someone and recently lost a case. Discuss Apple from a legal standpoint. How does Apple use the items that you mentioned? First define them and then tell how Apple uses or does not use them.

•Please include any research for evidence, if any, that Apple uses any of the following in its business activities: "business intelligence", "enterprise resource planning (ERP)", "customer relationship management (CRM)", "data mining", and "intelligent systems", and assess the results in the report

Additional Instructions:

it will be important to:

•Extract the lessons of your Apple research for enterprise information systems managers.

•Present evidence whether Apple uses any of the topics named in the second "bullet" above

Required Readings:

•Benson, R.J., Ribbers, P.M., and Blitstein, R.B. (2014) Trust and Partnership: Strategic IT: Management for Turbulent Times. Preface and Chapter 1.
•High, P.A. (2014) Implementing World Class IT Strategy: How IT Can Drive Organizational Innovation. Foreword and Chapter 1.

Further utilize:
•Apple, Inc. publishes "hot news" on its products at http://www.apple.com/hotnews/.
•A source of news on Samsung's and competing smartphones is at http://ibnlive.in.com/newstopics/samsung.html.
•Lenovo announces its products at http://shop.lenovo.com/us/en/portals/communications/

View Full Posting Details