Problem
Define access control in an operating system environment and critically analyze why a secure operating system provides an access enforcement mechanism. Evaluate the access control security requirements of the operating system security and protection requirements.