Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

10. To protect the internal components of a computer system, data integrity, and

ID: 666920 • Letter: 1

Question

10. To protect the internal components of a computer system, data integrity, and protection against external codes accessing the control of computer hardware, operating system can create different “defense” or “protection” mechanisms. Name and briefly explain the three methods discussed in our class. 10. To protect the internal components of a computer system, data integrity, and protection against external codes accessing the control of computer hardware, operating system can create different “defense” or “protection” mechanisms. Name and briefly explain the three methods discussed in our class. 10. To protect the internal components of a computer system, data integrity, and protection against external codes accessing the control of computer hardware, operating system can create different “defense” or “protection” mechanisms. Name and briefly explain the three methods discussed in our class.

Explanation / Answer

Identification:
Identification occurs when a user claims an identity. This can be accomplished with a username, a process ID, a smart card, or anything else that can uniquely identify a subject.

Authentication:
It is the process of proving an identity and occurs when subjects provide appropriate credentials to prove their identity. Example: when a user provides the correct password with a username, the password proves that the user is the owner of the username.

Authorization:
Once a user is identified and authenticated, they can be granted authorization based on their proven identity