Question

In: Computer Science

1. Some Operating systems that were designed with a security mindset are GemSOS, Multics, Scomp There...

1. Some Operating systems that were designed with a security mindset are

  1. GemSOS, Multics, Scomp
  2. There has no such thing
  3. Windows, Mac, Linux
  4. Does, Minx

2. A protection state consists of

  1. Access control matrix
  2. subjects and objects
  3. System boundary and security perimeter
  4. Subjects, objects and the operations that subjects can perform on objects

3. What is the difference between secrecy and integrity?

  1. secrecy is concerned with unauthorized observation of information while integrity is concerned with unauthorized modification of information.
  2. Secrecy protects government classified information while integrity protects corporate information
  3. There is no difference
  4. Secrecy is concerned with unauthorized collection of information while integrity is concerned with unauthorized creation of information

4. Mandatory access control can be applied along with discretionary access and it is meant to do the followings

  1. Build a system for limited purpose
  2. Protect user from accidental modification or leakage of their own data in addition to preventing malicious program from making modification
  3. Build a military system
  4. Build a universally secure system

5. What is Operating System?

  1. The user interface with PC and Mac
  2. Processes and data in a computer system
  3. Software that provides access to various hardware resources in a computer system

6. The three components of referent monitor are

  1. TCB, Operating System, Interfaces
  2. Interface, Authorization module, Policy store
  3. Application, TCB, Security
  4. Interface, Files, Implementation

Solutions

Expert Solution

Solution

Answer

1)
GemSOS, Multics, Scomp
---
2)
Subjects, objects and the operations that subjects can perform on objects
---
3)
secrecy is concerned with unauthorized observation of information while integrity is concerned with unauthorized modification of information.

---
4)
Protect a user from accidental modification or leakage of their own data in addition to preventing malicious programs from making those modifications
---
5)
Software that provides access to various hardware resources in a computer system
---
Explanation

1)
GemSOS, Multics, Scomp these are the OS building with Security kernel these are the OS specially designed for Security Mechanism
---
2)
A protection state consists of
Subjects
objects
operations that subjects can perform on objects
---
3)
Integrity is concerned with unauthorized alteration of information.
secrecy is concerned with unauthorized observation of information

---
4)
Mandatory access control can be applied along with discretionary access means
Protect a user from accidental modification or leakage of their own data in addition to preventing malicious programs from making those modifications
---
5)
What is Operating System?
Software that provides access to various hardware resources in a computer system
---

Question 6

I am not sure

but i am guessing

Application, TCB, Security

---

all the best


Related Solutions

Two systems were constructed to disinfect a raw water source. One of the systems was designed...
Two systems were constructed to disinfect a raw water source. One of the systems was designed as a CSTR, the other as PER (tank divided into 3, 5m long passes using vertical baffles).The flow rate is 90 m^3/day. The influent coliform is count 100. Both tanks have a volume of 30 m^3 (H= 2m, W=3m, L=5m). Chlorine is added as the disinfectant. The disinfection rates follows a first order relationship as follows dN/dt = kN Where N is the number...
Assess the relationships between continuous monitoring for 1) NIST Systems Security Engineering, SP 800-160, Systems Security...
Assess the relationships between continuous monitoring for 1) NIST Systems Security Engineering, SP 800-160, Systems Security Engineering and 2) IETF SACM. Consider for your Analysis and Conclusions utilizing the NIST enterprise levels: • Level 1: Organization • Level 2: Mission/Business Processes • Level 3: System
What are some physical security design elements for alarm/access control systems servers?
What are some physical security design elements for alarm/access control systems servers?Why is Physical Security design elements for alarm/access control systems/servers so crucial in a data center?
Operating systems are in use everywhere in our society: Discuss what security measures you have implemented...
Operating systems are in use everywhere in our society: Discuss what security measures you have implemented or will implement as a result of this unit
. 1. In the Operating System zoo describe the 4 different types of Operating Systems and...
. 1. In the Operating System zoo describe the 4 different types of Operating Systems and describe them. 2. What is a process, when are they created and when are they terminated.
1. In the Operating System zoo describe the 4 different types of Operating Systems and describe...
1. In the Operating System zoo describe the 4 different types of Operating Systems and describe them. 2. Describe what happens when booting a computer ? 3. What are System calls. Provide 6 file and directory system calls
1. A) A manufacturer of sprinkler systems designed for fire protection claims that the average activating...
1. A) A manufacturer of sprinkler systems designed for fire protection claims that the average activating temperature is at least 135 degrees F. To test this claim, you randomly select a sample of 32 systems and find the mean activation temperature to be 133 degrees F. Assume the population standard deviation is 3.3 degrees F. At a=0.10, do you have enough evidence to reject the null hypothesis? 10 points.       Ho: u>= 135 Ha: u<135. B) In auto racing, a pit stop...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to risks that emanate from users such as fraud, terrorisms, theft and other intentional acts for which control measures must be installed to check and minimize these risks, but also risks that emanate from natural disasters such as widespread flood, earthquake, fire, hurricanes, pandemic outbreak etc. which in most cases are uncontrollable or prevented. In this regard, organizations must have a disaster recovery plan (contingency...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to risks that emanate from users such as fraud, terrorisms, theft and other intentional acts for which control measures must be installed to check and minimize these risks, but also risks that emanate from natural disasters such as widespread flood, earthquake, fire, hurricanes, pandemic outbreak etc. which in most cases are uncontrollable or prevented. In this regard, organizations must have a disaster recovery plan (contingency...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to...
Question 1 The accounting information systems designed and installed in organizations are exposed not only to risks that emanate from users such as fraud, terrorisms, theft and other intentional acts for which control measures must be installed to check and minimize these risks, but also risks that emanate from natural disasters such as widespread flood, earthquake, fire, hurricanes, pandemic outbreak etc. which in most cases are uncontrollable or prevented. In this regard, organizations must have a disaster recovery plan (contingency...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT