Discussion post

 How operating systems control access to resources 

 Network threats and vulnerabilities 

I want a 300-word discussion post for each of the above Questions with references

Note: The matter should be like own word

          No plagiarism 

          APA format