Swamped with your writing assignments? Take the weight off your shoulder!
You will be including revised content from this interactive assignment in your OS Theory Concept Map final assignment. Prior to completing work on this interactive assignment, you may wish to review the instructions included for the OS Theory Concept Map final assignment later in Week 5 to see how it fits into your overall final project.
To complete this week’s interactive assignment, you will continue building the OS Theory Concept Map by addressing the following topics concerning mechanisms necessary to control the access of programs, processes, or users:
Outline the goals and principles of domain- and language-based protection in a modern computer system, and describe how an access matrix is used to protect specific resources a process can access. (Consider using a matrix representation to illustrate concepts.)
Describe how security is used to protect programs, systems, and networks from threats.
Logically arrange the essential concepts about protection and security into a hierarchy of nodes that branch from the main idea. Include cross-links where necessary to show relationships in different sections of the concept map. Use connecting nodes to accurately describe each relationship between topics that connect. Section 5 must have at least two nodes and three connecting nodes.
After completing Section 5 of the concept map, ost a link to your OS Theory Concept Map in the discussion forum for your peers to review.
Guided Response: Review several of your peers’ concept maps, and respond to at least two of your peers by the end of Day 5. In your responses, describe your initial impressions of their concept maps as a whole. Include at least one question about how the different sections of the concept maps relate to each other.
Provide suggestions or comments about how they could improve Section 5 of their concept maps before final submission. Describe any organizational elements that surprised you. Identify any pieces of information that you felt were missing or unclear. Make at least one recommendation about how each peer can refine the organization or clarify the concepts of protection and security. Support your statements with evidence from your sources.
You must post your required replies earlier in the week to promote more meaningful and interactive discourse in this discussion forum and to give your peers feedback before the final submission is due.