What are the steps to develop a secure OS?
What will be an ideal response?
In general, the development of secure OS can be made in the following five steps:
* Analyze the system.
* Define a security policy.
* Derive a security model based on the security policy.
* Choose a development process and implementation method.
* Develop a cycle:
* Design
* Design verification
* Implementation
* Implementation verification
There is always a trade-off between the cost of building the security protection and of recovering from intrusions. The amount of effort used to build the security features of the OS depends on the usage of the OS and the deployment environment.
You might also like to view...
The Java method printf is based on the ________ language.
a. Pascal b. C++ c. C d. ADA
Linked List method list Iterator returns a(n) __________.
a. Iterator. b. List. c. sub list. d. bidirectional iterator.
What should you wear while installing a circuit board in a computer?
A. leather shoes B. ESD wrist strap C. static bag D. rubber gloves
____________ is concerned with human physical continuity. As the name implies, it asserts that our identity is supplied by the continuity of our physical form.
Fill in the blank(s) with the appropriate word(s).