What is the protection mechanism?
The protection mechanism is a security device on a computer that works by enforcing selected security principles for different users in the system. Without protection mechanism, it would not be possible to prevent individual users from accessing the system; Each user could add programs, delete programs, and make other significant changes in your computer without restrictions. With the protection mechanism, the computer administrator may limit the rights of individual users and classify some as limited or limited users with comparably less rights compared to administrators. Not all guests are created the same; Some have full VIP access to the party, while others can only participate in the basic capacity. Computer administrators are the VIP guests because they can go anywhere in the system and do anything they like. Limited users, on the other hand, are entitled to do things that administrators allow them. The main responsibility of the protection mechanisms is to maintain a list of ordinary guests and "VIP" separate, whichE that every computer user stays in a given role.
The basic model of the protective mechanism is a matrix access model, which is essentially a list based on a grid defining the capabilities of a particular process on the computer. For example, some assets or programs could be allowed to read and write to the hard drive, while other programs could only be allowed to get information from the unit without adjusting or adding it. One of the most common examples of this behavior is Firewall on modern Windows® operating systems; The first time the program attempts to access the Internet, it hits the firewall and asks if it should be programmed.
In the absence of a working protection mechanism, it will no longer be able to decide who should and who should not have access to files and computer authorities. It is analogous with a previously private party that unlocks its door and sends all its withoutLake home; Now anyone and everyone can enter freely and there is nothing to prevent them from fully utilizing the equipment inside. In other words, if the protective mechanisms on the system fail, the computer is exposed.