Posts

Showing posts from October, 2022
Image

Operating Systems Environment

Image

Single and Multi - Threading

Image
 

Memory Functions in Operating Systems

Image

Memory File Storage

Image
 

Protection and Security

Image
All organizations want to protect themselves from cyber criminals and security breaches.  As we all know a cyber attack as a result of a security breach can change the whole landscape of your day-to-day operations. When building a formal security model to protect resources. What there are some key elements you want to consider when implementing your IT security?  Is it safe and is it secure? One way that can help is to make your IT security simple and easy to manage. Who are we securing our systems from and for, people?  The implementation of the access list and capability list can help.   What is an access control list? Access control list are protocols for a user that tells the system what users are granted or denied permission to use an object or system resource such as a file, servers, printers, directories, etc