Give an example of the use of temporal separation for security in a computing environment

What will be an ideal response?


In
some
secure
systems,
only
processes
of
one
sensitivity
level
are
run
at
one
time.
When
a
batch
of
tasks
requiring
higher
or
lower
security
are
to
be
run,
all
tasks
are
removed
from
the
system,
storage
media
containing
sensitive
data
and
programs
are
removed
and
new
ones
installed,
and
the
operating
system
is
rebooted.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. If a method does not return a value, the return-value-type in the method declaration can be omitted. b. Placing a semicolon after the right parenthesis enclosing the parameter list of a method declaration is a syntax error. c. Redeclaring a method parameter as a local variable in the method’s body is a compilation error. d. Forgetting to return a value from a method that should return a value is a compilation error.

Computer Science & Information Technology

In Word, a list of templates, or ________ documents, displays on the right

A) purchased B) single-spaced C) preformatted D) non-printing

Computer Science & Information Technology

To recall the most recently deleted text, which button would you click?

A) Undo B) Insert C) Enter D) Delete

Computer Science & Information Technology

If you want to store passwords on a digital device, make sure to _________ the file in which they are stored.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology