summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authormo khan <mo@mokhan.ca>2021-07-24 12:44:58 -0600
committermo khan <mo@mokhan.ca>2021-07-24 12:44:58 -0600
commit5def2a393a777fd3639eb1c4456ae5841c24aab3 (patch)
treeef5fffb70329532abbfec05b08344ac3e5245249 /doc
parent4892dee1e49827a69f06cb3995b5e66041184d22 (diff)
feat: answer question 2 in assignment 4
Diffstat (limited to 'doc')
-rw-r--r--doc/assignment4.md17
1 files changed, 17 insertions, 0 deletions
diff --git a/doc/assignment4.md b/doc/assignment4.md
index 20326a4..dd3c2c3 100644
--- a/doc/assignment4.md
+++ b/doc/assignment4.md
@@ -34,6 +34,23 @@ Please answer the following questions in complete sentences. Your answer for eac
determine **what** will be done.
1. What is an access matrix, and how can it be implemented?
+
+ A model of protection known as the access matrix represents which domains have
+ access to which objects.
+
+ The follow table is an example of an access matrix for different users access
+ to a specific resource.
+
+ | user | read | write | execute |
+ | ---- | ---- | ----- | ------- |
+ | 1000 | x | | x |
+ | 2000 | x | x | x |
+ | 3000 | x | | |
+
+ Access matrices makes it possible to define what types of operations different
+ domains can perform against different types of objects. The access matrix can
+ implement policy decisions related to protection.
+
1. How does a virus differ from a worm?
1. What is the difference between symmetric encryption and asymmetric encryption?
1. What are the two main varieties of authentication algorithms?