Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Part 1: Concepts (20 marks; 4 marks each) Please answer the following questions

ID: 3875886 • Letter: P

Question

Part 1: Concepts (20 marks; 4 marks each) Please answer the following questions in complete sentences. Your answer for each question should be about 150 words.

1. Why is it important to distinguish between mechanisms of protection and policies of protection?

2. What is an access matrix, and how can it be implemented?

3. How does a virus differ from a worm?

4. What is the difference between symmetric encryption and asymmetric encryption?

5. What are the two main varieties of authentication algorithms?

Explanation / Answer

Solution:

2 is solved, please repost other.

A protection system consists of a protection state, which describes the operations that system subjects can perform on system objects, and a set of protection state operations, which enable modification of that state.
A protection system enables the definition and management of a protection state. A protection state consists of the specific system subjects, the specific system objects, and the operations that those subjects can perform on those objects. The access matrix is used to define the protection domain of a process.

Methods of implementing access matrix:

I hope this helps if you find any problem. Please comment below. Don't forget to give a thumbs up if you liked it. :)