Reference no: EM132431074
Part 1: Answer the following questions
1. Explain why it is difficult to retrofit security in ordinary/commercial operating systems
2. Explain how SELinux uses Domain and type enforcement to control access to objects
3. Virtual machine systems protect users from each other but not from themselves. Suggest a VM based solution that would protect users from malicious processes
4. Explain the architectural difference between Security Kernel, Separation Kernel and Virtual Machine Monitor.
Part 2: Answer all of the following questions
1. At a very high level, place the following operating systems in the Orange book class they could be evaluated at:
a) VAX VMM,
b) SELinux,
c) DOS,
d) Multics,
e) GEMSOS.
Explain why for each classification.
2. What is the difference between SELinux and VAX VMM in terms of their ability to provide a) Complete Mediation of security sensitive operations, b) complete mediation of all security sensitive operations on system resources and c) how we verify whether complete mediation is provided by the respective reference monitors?
Part 3: Answer all of the following questions
1. Describe the concept of labeled networking in terms of how can it be implemented. What difficulties prevented the implementation of labeled networking in secure systems?
2. Comment on the complexity of providing labeling and transition state in SE linux vs VAX VMM. Which one is easier or simpler to implement, why?