Securing computer architecture involves three rings of protection. What is in each ring? Provide examples

What will be an ideal response?

Answer:
Ring 3: Software applications include Web browser, word processing, spreadsheet, and accounting software. Login passwords to open applications are an example of Ring 3 protection.

Ring 2: Input/output drivers are programs that access input and output devices, such as printers or disks. Utilities include RDBMS for accessing a relational database. An example of Ring 2 protection would be to require a password to access a data file.

Ring 1: Operating systems, such as Unix, are programs running computer hardware. Ring 1 protection might consist of limiting access to operating system commands based on the security level of the user.

Business

You might also like to view...

Outline an effective strategy for writing routine replies and positive messages

What will be an ideal response?

Business

Nearly 100% of the observed occurrences of a random variable x that is normally distributed will

fall within three standard deviations of the mean of the distribution of x. A) True B) False

Business