SECURITY POLICY AND MECHANISM
The term security and protection are often used interchangeable. Nevertheless, it is frequently useful to make a distinction between the general problems involved in making sure that files are not read or modified by unauthorized persons, which include technical, managerial, legal and political issues on the one hand, and the specific operating system mechanism used to provide security on the other to avoid confusion, we will use the term security to refer to the overall problem, and the term protection mechanisms to refer to the specific operating system mechanisms used to safeguard information in the computer. The boundary between them is not well defined, however. A more interesting problem is what to do about intruders. These come in two varieties. Passive intruders just want to read files they are not authorized or read. Active intruders are more malicious; they want to make unauthorized changes to data.
AUTHENTIC CONCEPT
a) Password
Passwords are often used to protect object in the computer system, in the absence of more complete protection scheme. They can be considered a special case of either keys or capabilities. For instance, a password could be associate with each resource such as file. Whenever a request is made to use the resource, the password must be given. If the password is correct, access isgranted. Different passwords may be associated with different access rights. For example, different password may be used for reading, appending and updating a file.
b) Artifact
A completely different approach to authorization is to check to see if the user has some item, normally a plastic card with a magnetic stripe on it. The card is inserted into the terminal, which then checks to see whose card it is. This method can be combined with a password, so a user can only log in if he :
1. has the card
2. knows the password
Automated cash dispensing machine usually work this way. Another technique is signature analysis. The user sign his name with a special pen connected to the terminal and the computer compares it to a known specimen stored online. Even better is not to compare the signature, but compare the pen motion made while writing it. A good forger may be able to copy the signature, but will not have a clue as to the exact order in which the stroke were made.
protection concept an access control
- Protection is concerned with keeping data safe from improper or unauthorized access and physical damage . When faulty memory resulted in the disk data being corrupted, technicians replacing disk, after disk and the problem not going away we need decided to swap the memory as part of an error exploration.
- We can control access to files, specifying who and how can read, write, execute, delete and list files.
- Access control has a number of strategies:
- Access control list (ACL) specifies user names or groups, and types of access.
- Associate passwords and access control (read only, modify with tracked changes) per file.