Commit 5def2a3
Changed files (1)
doc
doc/assignment4.md
@@ -34,6 +34,23 @@ Please answer the following questions in complete sentences. Your answer for eac
determine **what** will be done.
1. What is an access matrix, and how can it be implemented?
+
+ A model of protection known as the access matrix represents which domains have
+ access to which objects.
+
+ The follow table is an example of an access matrix for different users access
+ to a specific resource.
+
+ | user | read | write | execute |
+ | ---- | ---- | ----- | ------- |
+ | 1000 | x | | x |
+ | 2000 | x | x | x |
+ | 3000 | x | | |
+
+ Access matrices makes it possible to define what types of operations different
+ domains can perform against different types of objects. The access matrix can
+ implement policy decisions related to protection.
+
1. How does a virus differ from a worm?
1. What is the difference between symmetric encryption and asymmetric encryption?
1. What are the two main varieties of authentication algorithms?