Discuss the below:
- advantages and disadvantages of at least three different measures used to protect operating systems
- ease of implementation of the measures
- associated security management issues related to measures discussed above.
- ranking of the measures from best to worst with supporting rationale