Computer System Security: Reference Monitor and TCB
10 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the role of the Reference Monitor in computer system security?

  • It provides core security functions in computer systems
  • It creates active OS processes that act on behalf of principles
  • It checks whether access requests to resources should be authorized
  • It mediates all access requests to computer resources (correct)
  • What is the TCB in computer systems?

  • A guard mechanism that checks whether access requests to resources should be authorized
  • A part of computer systems that provides core security functions (correct)
  • An abstract access control concept that mediates all access requests to computer resources
  • The implementation of any reference monitor
  • What are principles in the context of computer system security?

  • Active OS processes that act on behalf of principles
  • The users or entities that make access requests to system resources
  • Users or entities that make decisions about making system access requests as if they were users (correct)
  • The passive system resources such as access to files, directories, printers
  • What do subjects represent in the context of computer system security?

    <p>The active OS processes that act on behalf of principles</p> Signup and view all the answers

    Where can a reference monitor be placed in an operating system?

    <p>In the OS kernel</p> Signup and view all the answers

    What is the purpose of the reference monitor?

    <p>To establish the validity of an access request and make an access decision</p> Signup and view all the answers

    What does the trusted computing base (TCB) control access to?

    <p>Computing resources</p> Signup and view all the answers

    What are some common placements of the reference monitor?

    <p>Stack, sandboxed, embedded</p> Signup and view all the answers

    What must the trusted computing base (TCB) actively prevent?

    <p>Misuse of the OS and external actors</p> Signup and view all the answers

    What are some responsibilities of the trusted computing base (TCB)?

    <p>Isolation of objects and memory protection</p> Signup and view all the answers

    More Like This

    Designing a Secure Operating System
    20 questions
    Computer System Security and Ethics
    5 questions
    Computer System Security
    18 questions
    Use Quizgecko on...
    Browser
    Browser