GATE (Graduate Aptitude Test in Engineering) Computer Science & IT (CS) Operating System-Protection and Security Study Material (Page 8 of 10)
Choose Programs:
🎓 Study Material (1190 Notes): 2024-2025 Syllabus
Rs. 1000.00 -OR-
3 Year Validity (Multiple Devices)
Topic-wise Notes & SampleDetails
🎯 302 Numeric, 2894 MCQs (& PYQs) with Full Explanations (2024-2025 Exam)
Rs. 650.00 -OR-
3 Year Validity (Multiple Devices)
CoverageDetailsSample Explanation
Help me Choose & Register (Watch Video) Already Subscribed?
Group Protection and Single and Temporary Acquired Permission
Edit
Group Protection
- There are three classes: the user, a trusted working group associated with the user, and the rest of the users.
- All authorized users are separated into groups.
- The basis for group membership is need to share. The group members have some common interest and therefore are assumed to have files to share with the other group members.
- When creating a file, a user defines access rights to the file for the user, for other members of the same group, and for all other users in general.
- The choices for access rights are a limited set, such as {read, write, execute, delete} . For a particular file, a user might declare read-only access to the general world, read, and write access to the group, and all rights to th…
… (703 more words) …
Subscribe (by clicking here) to view full notes and track progress.
User Authentication: Using Passwords
Edit
User Authentication
Authentication mechanisms use any of three qualities to confirm a user՚s identity:
- Something the user knows: Passwords, PIN numbers, passphrases, a secret handshake, and mother՚s maiden name are examples of what a user may know.
- Something the user has: Identity badges, physical keys, a driver՚s license, or a uniform are common examples of things people have that make them recognizable.
- Something the user is: These authenticators, called biometrics, are based on a physical…
… (383 more words) …
Subscribe (by clicking here) to view full notes and track progress.