Many designers believe that the operating system should always be given a “most trusted” status. Some designers feel that even the operating system should be curtailed, particularly in its ability to reference certain areas of memory. Discuss the pros and cons of allowing the operating system to access the full range of real addresses in a computer system at all times.
What will be an ideal response?
There is, of course, the principle of least privilege, which should be emphasized as a
solid design principle. If the OS can access anything at any time, then it is possible for intruders
to compromise the entire system by somehow usurping operating system privilege. Certainly,
someone, somewhere needs to be able to access any part of the system, but this ability
should be severely restricted to only the most special situations.
You might also like to view...
To constrain a line angle to a multiple of 45°, hold down the ____ key as you drag.
a. SHIFT b. ESC c. CTRL d. ALT
What is important to disable unused features on a mobile device?
What will be an ideal response?
Each pie slice displayed on a pie chart is an example of a:
A) data marker. B) chart sheet. C) legend. D) data point.
What Cisco IOS command is used to display the current administrative and operational trunking modes of an interface?
A) show interfaces trunk B) show trunk C) show trunk switchport D) show interfaces interface switchport