OS Security by Separation
Separation methods:
• Physical
Different physical objects/printers for different levels of security
• Temporal (time)
Programs with different security levels execute at different times
• Logical
User program cannot access objects outside its domain
• Cryptographic
Processes conceal their data and logic through use of encryption
Combinations are possible