Security Assignment
Security Assignment
Hint
i. Analyze security features of an information system Information systems use
various methods to keep data safe, such as:
e) Access control: Defines who can view or modify data through mechanisms like
user authentication and authorization. For example, Role-Based Access Control
(RBAC) in systems
ii. Discuss memory and address protection Operating systems protect memory so
that one program does not interfere with another. This is done using:
a) File permissions: It define who can access a file and what actions they can
perform, such as reading, writing, or executing. Permissions are a cornerstone of
file security in most operating systems.
c) User roles to limit access: User roles restrict file access based on a user’s
responsibilities or privileges within a system, ensuring that only authorized
individuals can interact with specific files.
iv. Analyze control mechanisms for general object access The system controls access
to things like files, printers, or networks by using:
a) Access Control Lists (ACLs): ACLs are detailed lists that specify which users or
groups can access an object and what operations they can perform (e.g., read,
write, execute).
Hint
i. Define Policy