What are the steps to develop a secure OS?

What will be an ideal response?


In general, the development of secure OS can be made in the following five steps:
* Analyze the system.
* Define a security policy.
* Derive a security model based on the security policy.
* Choose a development process and implementation method.
* Develop a cycle:
      * Design
      * Design verification
      * Implementation
      * Implementation verification

There is always a trade-off between the cost of building the security protection and of recovering from intrusions. The amount of effort used to build the security features of the OS depends on the usage of the OS and the deployment environment.

Computer Science & Information Technology

You might also like to view...

What will be output by the following statements?

double x = .0012345; cout << fixed << x << endl; cout << scientific << x << endl; a. 1.234500e-003 0.001235 b. 1.23450e-003 0.00123450 c. .001235 1.234500e-003 d. 0.00123450 1.23450e-003

Computer Science & Information Technology

The EBK can be considered to contain the most authoritative possible representation of security practices and their clarifying ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What limits the areal density of a hard disk drive?

What will be an ideal response?

Computer Science & Information Technology

Many businesses craft an ethical guidance policy as part of their overall security policy. In the event that there is a conflict between your employer's ethical policy and your own personal ethical views, how should you handle this conflict?

A. Contact a lawyer to have the company policy changed. B. Discuss the issue internally with your manager and IT security administrator. C. Post your disagreements with the issue on your social network account. D. Protest the concern by picketing outside of your employer's building.

Computer Science & Information Technology