What are the steps to develop a secure OS?

What will be an ideal response?


In general, the development of secure OS can be made in the following five steps:
* Analyze the system.
* Define a security policy.
* Derive a security model based on the security policy.
* Choose a development process and implementation method.
* Develop a cycle:
      * Design
      * Design verification
      * Implementation
      * Implementation verification

There is always a trade-off between the cost of building the security protection and of recovering from intrusions. The amount of effort used to build the security features of the OS depends on the usage of the OS and the deployment environment.

Computer Science & Information Technology

You might also like to view...

The Java method printf is based on the ________ language.

a. Pascal b. C++ c. C d. ADA

Computer Science & Information Technology

Linked List method list Iterator returns a(n) __________.

a. Iterator. b. List. c. sub list. d. bidirectional iterator.

Computer Science & Information Technology

What should you wear while installing a circuit board in a computer?

A. leather shoes B. ESD wrist strap C. static bag D. rubber gloves

Computer Science & Information Technology

____________ is concerned with human physical continuity. As the name implies, it asserts that our identity is supplied by the continuity of our physical form.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology