granularity of protection

  • 1Executable space protection — In computer security, executable space protection is the marking of memory regions as non executable, such that an attempt to execute machine code in these regions will cause an exception. It makes use of hardware features such as the NX bit.The… …

    Wikipedia

  • 2Memory protection — is a way to control memory access rights on a computer, and is a part of most modern operating systems. The main purpose of memory protection is to prevent a process from accessing memory that has not been allocated to it. This prevents a bug… …

    Wikipedia

  • 3Continuous data protection — (CDP), also called continuous backup or real time backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user… …

    Wikipedia

  • 4Access Control Matrix — or Access Matrix is an abstract, formal computer protection and security model used in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in… …

    Wikipedia

  • 5Protected mode — This article is about an x86 processor mode. For Internet Explorer Protected Mode, see Mandatory Integrity Control. x86 processor modes Mode First supported Real mode Intel 8086 8080 emulation mode NEC …

    Wikipedia

  • 6Lock (computer science) — In computer science, a lock is a synchronization mechanism for enforcing limits on access to a resource in an environment where there are many threads of execution. Locks are one way of enforcing concurrency control policies. Contents 1 Types 2… …

    Wikipedia

  • 7Metadata — For the page on metadata about Wikipedia, see Wikipedia:Metadata. The term metadata is an ambiguous term which is used for two fundamentally different concepts (types). Although the expression data about data is often used, it does not apply to… …

    Wikipedia

  • 8NX bit — The NX bit, which stands for No eXecute, is a technology used in CPUs to segregate areas of memory for use by either storage of processor instructions (or code) or for storage of data, a feature normally only found in Harvard architecture… …

    Wikipedia

  • 9IEEE P1619 — is an Institute of Electrical and Electronics Engineers (IEEE) standardization project for encryption of stored data, but more generically refers to the work of the IEEE P1619 Security in Storage Working Group (SISWG), which includes a family of… …

    Wikipedia

  • 10Storage virtualization — refers to the process of abstracting logical storage from physical storage. The term is today used to describe this abstraction at any layer in the storage software and hardware stack.Key conceptsAddress space remappingVirtualization of storage… …

    Wikipedia