blog




  • Essay / The Importance of Data Privacy and Security - 2293

    Now instead of changing the fundamentals of the operating system, we should base our changes on the fundamental needs of the user to make the work. We should create a simple model of security features with few settings to allow flexibility. Three layers of security need to be implemented for this to happen: These accounts would be Users, Groups, and Rest of World, each with less authority than the last. This is how web browsers classify networks today. Now, data shared between these systems, both private and public, would be better suited to three different parts of the file system. These file systems are documents, including My Documents, Shared Documents, and Public Documents. This gives the usage advantage of being able to combine secure data stored in familiar locations. This allows users to easily identify what each security element is and how to find their files. The rest can be managed by administrators and other authorized groups within the security policies they have defined.