Contain user information like text, databases, or programs. The user can apply like add modify and delete
Refers to how the record of a file may be accessed
Records accessed in some sequence, the file is processed in order, one after the other, this methos is the most primitive e.g., compilers.
Access records directly. Each record has its own address on the file. The records need not be in any sequence
Built on the base of sequential access. An index is created for each file which contains pointers.
Files are allocated disk spaces by the operating system
Files have links to disk blocks, directory contains pointers , no external fragmentation, effective for sequential ineffective for direct access file
Files occupy contiguous disk space assigned in linear order, prone to external fragmentation easy to implement
Solution to contiguous and linked allocation, index block is created
Identifying users and associating executing programs with those users
Refers to the misuse of the system services and network connection
Program Threats
If a user program is made these process do a malicious task
User need to punch card slot or enter key. Physical card or key used for system access.
User needs to pass their attribute. Biometric data used for user authentication.
Provide additional Security. Unique passwords for each login attempt.
Program capturing and sending user credentials and sends them to a malicious user
Represent physical devices like disks, terminals, printers, etc. Also known as Device files
Process which can choked down a performance by using system resources to the extreme, slowing down or shutting down the network.
Incorporates controls so that users can protect their private information UNIX.
Type C
Using Audit. Provides Protections and user accountability
Type B
Provide mandatory Protection system. Having all Properties of C2