To implement an access matrix, we must first understand what it is. An access matrix is a protection model within an operating system consisting of objects and domains. The access matrix determines which processes interact with objects within the domain. Objects within the domain can consist of both hardware and software. The lists below show the advantages and disadvantages of access lists associated with objects, and capabilities with domains. Access lists associated with objects Advantages Corresponds directly to the user’s needs. Easy revocation and review of access. Disadvantages Difficult to determine access rights for a domain. Takes time to search the domain for access rights. Capabilities with domains Advantages Useful for localizing information for a process. Secured against unauthorized access. Disadvantages Inefficient at the revocation of capabilities. Does not correspond directly to the user’s needs. Even though each implementation has its own strengths and w
This blog was created as a way to document my journey into the world of technology and cybersecurity.