Give clearly defined examples of two objects in a computer system configuration whose security level could change during the process of execution of an application on a given system.
Should be about 3 pages in length double spaced, citations in APA, with references listed at the end in APA format.