How selinux uses domain and type enforcement to control

Assignment Help Basic Computer Science
Reference no: EM132431074

Part 1: Answer  the following questions

1. Explain why it is difficult to retrofit security in ordinary/commercial operating systems

2. Explain how SELinux uses Domain and type enforcement to control access to objects

3. Virtual machine systems protect users from each other but not from themselves. Suggest a VM based solution that would protect users from malicious processes

4. Explain the architectural difference between Security Kernel, Separation Kernel and Virtual Machine Monitor.

Part 2: Answer all of the following questions

1. At a very high level, place the following operating systems in the Orange book class they could be evaluated at:

a) VAX VMM,

b) SELinux,

c) DOS,

d) Multics,

e) GEMSOS.

Explain why for each classification.  

2. What is the difference between SELinux and VAX VMM in terms of their ability to provide a) Complete Mediation of security sensitive operations, b) complete mediation of all security sensitive operations on system resources and c) how we verify whether complete mediation is provided by the respective reference monitors?

Part 3: Answer all of the following questions

1. Describe the concept of labeled networking in terms of how can it be implemented. What difficulties prevented the implementation of labeled networking in secure systems?

2. Comment on the complexity of providing labeling and transition state in SE linux vs VAX VMM. Which one is easier or simpler to implement, why?

Reference no: EM132431074

Questions Cloud

What is the difference between html and xhtml : Question 1: What is the difference between HTML and XHTML? Question 2: What is the difference between a GIF and an animated GIF?
Determine all the appropriate ratios for carnevale : Determine all the appropriate ratios for Carnevale. Benchmarks - Determination of the benchmark ratios for this firm.
What were some of the main concerns of second-wave feminism : What were some of the main concerns of second-wave feminism? To what extend was it an outgrowth of the civil rights movement?
Which measure of central tendency would be most appropriate : Which measure of central tendency (mean, median, or mode) would be the most appropriate for each piece of information listed, and why
How selinux uses domain and type enforcement to control : Explain why it is difficult to retrofit security in ordinary/commercial operating systems. Explain how SELinux uses Domain and type enforcement
Determine the effectiveness of the intervention : Describe how a social worker could evaluate treatment outcomes for this family to determine the effectiveness of the intervention.
Describe industry and type of business you plan to start : You are stepping into the world of becoming an entrepreneur. Describe the industry and the type of business you plan to start
Limitations of palmtop or handheld computers : What are the advantages and limitations of palmtop or handheld computers (including smartphones)? Do you have one? If so, for what do you use it?
Why is an extended access list needed : Why is an extended access list needed? What additional benefits or options exist with extended access lists?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd