Why do authorisation lists need encryption and protection since they are so susceptible to unauthorized modification? What type of harm may result from an unforeseen or unexpected change to these files
Why do authorisation lists need encryption and protection since they are so susceptible to unauthorized modification? What type of harm may result from an unforeseen or unexpected change to these files?
The operating system acts as an intermediary between the user and the hardware.
Access control in most operating systems requires the user to enter a username and password. If the username entered is incorrect, the user will not be able to access the computer.
The operating system is responsible for maintaining a list of authorized users who have access to the system.
Then, by maintaining a list of properly logged in users, restrict access to specific directories or files.
Despite the fact that valid users require access to the system, some rights must be exercised. Below are the details:
Users only have access to their own personal data.
They should not be allowed to view or access other users' data.
To perform action types on a file, certain restrictions must be enabled (such as reading, changing, or deleting content from the file)
The encryption technique can be used to protect highly sensitive data such as authorization lists. To prevent unauthorized users from reading confidential and important information.
Step by step
Solved in 2 steps