Professional Documents
Culture Documents
Р СОМ PUTER
OPERATIONS
Lesson 3
й
~~
ввв • 1
i
Р ► Computer vperations
ocëssi
—
proceѕѕing of e1ectronic
fi1eѕ
-
• •• f
~~ •f~~ , adјacent to the computer
, center for ѕafe ѕtorage for
~~~ ~~,~ , off-1ine data fi1eѕ
~
,
а~ иеиа}иiеш шоај іиашдоіалар sша}sAs маи ui~e.aedaS .
suoiіe)iјi ~ ads su ~ isap ауі о иiраоэ ~ е ше.а ~ оад sароз аашше.а ~оад .
шa~s~s ЈоЈ. sше.а~о~д paіie~apa~npoЈd о sЈasn уіiм s ~ іом іsAіeue шaіsl(S .
sxoiiХып3 гi
~zsiг~arІo~ыi 3о ыоiгN~~и~~s
Risks associated with DDP
Advantages of DDP
Cost reduction
➢Improved cost control responsibility
➢
Ва_сkuр flexibility
➢
E V E N T S THAT MAY D I S R U P T O R D E S T R O Y
COMPUTER CENTER
Nа-turаi disasters
➢ Human-таде disasters
System failure
➢
Oрerating ѕyѕtem
i /
оf Operating
~ systems 1. Logon procedure - the
first
~ line of defense against
Operating system unauthorized access
2. Access token - once
security - involves logon is
successful the OS creates an
policy, procedures and access token containing
controls that determine information about the user
who can access the which is usedto approve а11
acctions attempted bythe
operating system. user during the session.
3. Access controllist -
contains
the access privileges
assigned to valid users to
grant access to directories,
files, programs and printers.
4. Discretionary access
control
%
Threats to
Privileged personnel who abuse their
authority