What are the relative advantages and disadvantages of at least three different measures used to protect operating systems.
The ease of implementation of the measures.
The associated security management issues related to measures discussed above.
The ranking of the measures from best to worst with supporting rationale.