10. To protect the internal components of a computer system, data integrity, and
ID: 666920 • Letter: 1
Question
10. To protect the internal components of a computer system, data integrity, and protection against external codes accessing the control of computer hardware, operating system can create different “defense” or “protection” mechanisms. Name and briefly explain the three methods discussed in our class. 10. To protect the internal components of a computer system, data integrity, and protection against external codes accessing the control of computer hardware, operating system can create different “defense” or “protection” mechanisms. Name and briefly explain the three methods discussed in our class. 10. To protect the internal components of a computer system, data integrity, and protection against external codes accessing the control of computer hardware, operating system can create different “defense” or “protection” mechanisms. Name and briefly explain the three methods discussed in our class.Explanation / Answer
Identification:
Identification occurs when a user claims an identity. This can be accomplished with a username, a process ID, a smart card, or anything else that can uniquely identify a subject.
Authentication:
It is the process of proving an identity and occurs when subjects provide appropriate credentials to prove their identity. Example: when a user provides the correct password with a username, the password proves that the user is the owner of the username.
Authorization:
Once a user is identified and authenticated, they can be granted authorization based on their proven identity
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.