Unit 6 - Lecture Protection and Security Unit 6
Unit 6 - Lecture Protection and Security Unit 6
2. Capability List
Can be created by dividing Access Matrix Row Wise.
It is list of access rights that a user / domain or a process has
for a object.
It is divided into 2 fields:
Object Descriptor
Access Rights
Operation on Access Matrix Entries
1. Copy
2. Owner
It allows addition or removal of access rights.
3. Control Right
1. Trojan horse
A Trojan horse, or Trojan, is software that
appears to perform a desirable function for the
user, but steals information or harms the
system.
Include a Password