Please enable JavaScript.
Coggle requires JavaScript to display documents.
sOOPy, Domain refers to a collection of data or instructions that warrant…
sOOPy
DOMAIN
Supervisor Domain
The processor, when in the supervisor domain, can directly access memory or manipulate access control tables in a primitive file system.
User Domain
When in the user domain, the processor cannot access memory that belongs to other programs or the operating system.
Simplicity
-
It also allows for users to easily translate their general protection goals to appropriate system security configurations.
Resource Encapsulation
Computers have many resources such as memory, bandwidth, disk drive, and a monitor
Encapsulation finds its origin in object-oriented programming (OOP). The goal is to allow access or manipulation of the class data in only the ways the designer intended.
Programs or users have to be aware of the interface for the resource and only communicate with it in a defined manner.
Privilege
When talking about computers, privilege is a right for a user to act on a certain computer resource.
When a user gets a new computer they create an account and this account has privileges to install programs, delete files, etc.
Layering
When referencing computer security, layering is a separate level that a hacker must go through in order to access the system.
The purpose of layering is to slow down attackers. The more layers they have to go through, the longer it will take for the attacker.
-
Modularity
Modularity is a design technique that separates the functionality of a program into interchangeable components.
This related to cyber because using modules means that you can swap out a bad part. That way if a single module contains damage, you wont have to scrap the whole thing.
Data Hiding
By data hiding you can only allow necessary aspects of a data structure or a record to be observed or accessed.
-
Abstraction
Abstraction is the concept that something complicated can be thought of and represented more simply.
This applies to cybersecurity by removing clutter that can distract the user or programmer from using a resource correctly.
-
-