Commit 5def2a3

mo khan <mo@mokhan.ca>
2021-07-24 18:44:58
feat: answer question 2 in assignment 4
1 parent 4892dee
Changed files (1)
doc/assignment4.md
@@ -34,6 +34,23 @@ Please answer the following questions in complete sentences. Your answer for eac
   determine **what** will be done.
 
 1. What is an access matrix, and how can it be implemented?
+
+  A model of protection known as the access matrix represents which domains have
+  access to which objects.
+
+  The follow table is an example of an access matrix for different users access
+  to a specific resource.
+
+  | user | read | write | execute |
+  | ---- | ---- | ----- | ------- |
+  | 1000 |  x   |       |    x    |
+  | 2000 |  x   |   x   |    x    |
+  | 3000 |  x   |       |         |
+
+  Access matrices makes it possible to define what types of operations different
+  domains can perform against different types of objects. The access matrix can
+  implement policy decisions related to protection.
+
 1. How does a virus differ from a worm?
 1. What is the difference between symmetric encryption and asymmetric encryption?
 1. What are the two main varieties of authentication algorithms?