Discuss the relative advantages and disadvantages of at least three different measures used to protect operating systems.