diff options
| author | mo khan <mo@mokhan.ca> | 2021-07-24 12:44:58 -0600 |
|---|---|---|
| committer | mo khan <mo@mokhan.ca> | 2021-07-24 12:44:58 -0600 |
| commit | 5def2a393a777fd3639eb1c4456ae5841c24aab3 (patch) | |
| tree | ef5fffb70329532abbfec05b08344ac3e5245249 /doc | |
| parent | 4892dee1e49827a69f06cb3995b5e66041184d22 (diff) | |
feat: answer question 2 in assignment 4
Diffstat (limited to 'doc')
| -rw-r--r-- | doc/assignment4.md | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/doc/assignment4.md b/doc/assignment4.md index 20326a4..dd3c2c3 100644 --- a/doc/assignment4.md +++ b/doc/assignment4.md @@ -34,6 +34,23 @@ Please answer the following questions in complete sentences. Your answer for eac determine **what** will be done. 1. What is an access matrix, and how can it be implemented? + + A model of protection known as the access matrix represents which domains have + access to which objects. + + The follow table is an example of an access matrix for different users access + to a specific resource. + + | user | read | write | execute | + | ---- | ---- | ----- | ------- | + | 1000 | x | | x | + | 2000 | x | x | x | + | 3000 | x | | | + + Access matrices makes it possible to define what types of operations different + domains can perform against different types of objects. The access matrix can + implement policy decisions related to protection. + 1. How does a virus differ from a worm? 1. What is the difference between symmetric encryption and asymmetric encryption? 1. What are the two main varieties of authentication algorithms? |
