Unit 4 - Lecture Protection and Security
Unit 4 - Lecture Protection and Security
Access Control
Method that determines:
What types of access are permitted on different resources
Under what circumstances
By Whom
Access Control
2. Capability List
Can be created by dividing Access Matrix Row Wise.
It is list of access rights that a user / domain or a process has
for a object.
It is divided into 2 fields:
Object Descriptor
Access Rights
Operation on Access Matrix Entries
1. Copy
2. Owner
It allows addition or removal of access rights.
3. Control Right
1. Trojan horse
A Trojan horse, or Trojan, is software that
appears to perform a desirable function for the
user, but steals information or harms the
system.
Include a Password