ClubEnsayos.com - Ensayos de Calidad, Tareas y Monografias
Buscar

La protección de la información en los sistemas informáticos


Enviado por   •  26 de Noviembre de 2013  •  Informes  •  393 Palabras (2 Páginas)  •  164 Visitas

Página 1 de 2

Essay of The Protection of Information in Computer Systems

By Saltzer, J.H., & M.D. Schroeder.

The protection of information is one of the must biggest challenges that the Companies and the common people have. This is because the manager system has to give the correct authority to each person. Here I have an example, in our house if we share the same electronic item we don’t like that any family member sniff on our personal information, so we have to take the relevant cautions to avoid this mishap. There are some security techniques that we can applied to computer systems. Therefore, the real aim of a secure system is to avoid all unauthorized use of information.

About the functional levels of Information Protection, we have many different designs that have been proposed and mechanisms implemented for protecting information in computer systems.

Then in the other hand the author attempt to explain us the technical underpinnings mainly focused on a the development of the technical basis of information protection in modern

computer systems.

Then the descriptor-based protections systems are used in some systems to organize addressing and storage allocation. Furthermore we have the capability system that was suggested by Dennis and Van Horn, this system works as a manager of who may load values into the protection descriptor registers, when someone introduces the privileged state bit. Also the access control system affords exactly such a delay by inserting an extra authorization check at the latest possible point. We should protect an object other than a segment. So to remove the limitations for protected objects an domains, we have to protect the subsystem.

Since the 1960’s the implementation of protection mechanisms was established using base and bound registers. So they have to experiment with different architectures but there were five principles areas: 1) certification of the correctness of protection system designs and

implementations, 2) invulnerability to single faults, 3) constraints on use of information after release, 4) encipherment of

information with secret keys, and 5) improved authentication mechanisms.

In conclusion, since the first computer systems we have had problems with security, protection and privacy so over the years we have to learn how to make more insurance systems. I think that it’s impossible to make perfect system that support attacks and unauthorized logins because for a protection technology we always have the counterpart that will allow revert this protection.

...

Descargar como (para miembros actualizados)  txt (2.5 Kb)  
Leer 1 página más »
Disponible sólo en Clubensayos.com