What are the steps to develop a secure OS?
What will be an ideal response?
In general, the development of secure OS can be made in the following five steps:
* Analyze the system.
* Define a security policy.
* Derive a security model based on the security policy.
* Choose a development process and implementation method.
* Develop a cycle:
* Design
* Design verification
* Implementation
* Implementation verification
There is always a trade-off between the cost of building the security protection and of recovering from intrusions. The amount of effort used to build the security features of the OS depends on the usage of the OS and the deployment environment.
You might also like to view...
What will be output by the following statements?
double x = .0012345; cout << fixed << x << endl; cout << scientific << x << endl; a. 1.234500e-003 0.001235 b. 1.23450e-003 0.00123450 c. .001235 1.234500e-003 d. 0.00123450 1.23450e-003
The EBK can be considered to contain the most authoritative possible representation of security practices and their clarifying ____________________.
Fill in the blank(s) with the appropriate word(s).
What limits the areal density of a hard disk drive?
What will be an ideal response?
Many businesses craft an ethical guidance policy as part of their overall security policy. In the event that there is a conflict between your employer's ethical policy and your own personal ethical views, how should you handle this conflict?
A. Contact a lawyer to have the company policy changed. B. Discuss the issue internally with your manager and IT security administrator. C. Post your disagreements with the issue on your social network account. D. Protest the concern by picketing outside of your employer's building.