Access Control

A computer system consists of a set of hardware and software objects. The protection domain is a set of pairs of objects and rights needed to access those objects. An access matrix is a representation of protection domains. (It is more conceptual than actual however.) Each row specified the object, and a right that can be performed as…

Security Goals and Threats

Computer security is the freedom from theft of or damage to hardware, software, or information, and from disruption or misdirection of services. Protection is the set of mechanisms and policies that guarantee computer security, including the confidentiality, integrity, availability, and authenticity of all data and services. Common types of compromised computer security Information disclosure Information modification Information…