How a fence register is used for relocating a user program

Assignment Help Management Information Sys
Reference no: EM131131664

1. Give an example of the use of physical separation for security in a computing environment.

2. Give an example of the use of temporal separation for security in a computing environment.

3. Give an example of an object whose sensitivity may change during execution.

4. Respond to the allegation "An operating system requires no protection for its executable code (in memory) because that code is a duplicate of code maintained on disk."

5. Explain how a fence register is used for relocating a user's program.

6. Can any number of concurrent processes be protected from one another by just one pair of base/bounds registers?

7. The discussion of base/bounds registers implies that program code is execute only and that data areas are read-write-only. Is this ever not the case? Explain your answer.

8. A design using tag bits presupposes that adjacent memory locations hold dissimilar things: a line of code, a piece of data, a line of code, two pieces of data, and so forth. Most programs do not look like that. How can tag bits be appropriate in a situation in which programs have the more conventional arrangement of code and data?

9. What are some other modes of access that users might want to apply to code or data, in addition to the common read, write, and execute permission?

10. If two users share access to a segment, they must do so by the same name. Must their protection rights to it be the same? Why or why not?

11. A problem with either segmented or paged address translation is timing. Suppose a user wants to read some data from an input device into memory. For efficiency during data transfer, often the actual memory address at which the data are to be placed is provided to an I/O device. The real address is passed so that time-consuming address translation does not have to be performed during a very fast data transfer. What security problems does this approach bring?

12. A directory is also an object to which access should be controlled. Why is it not appropriate to allow users to modify their own directories?

13. Why should the directory of one user not be generally accessible to other users (not even for read-only access)?

14. File access control relates largely to the secrecy dimension of security. What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?

15. One feature of a capability-based protection system is the ability of one process to transfer a copy of a capability to another process. Describe a situation in which one process should be able to transfer a capability to another.

16. Describe a mechanism by which an operating system can enforce limited transfer of capabilities. That is, process A might transfer a capability to process B, but A wants to prevent B from transferring the capability to any other processes. Your design should include a description of the activities to be performed by A and B, as well as the activities performed by and the information maintained by the operating system.

17. List two disadvantages of using physical separation in a computing system. List two disadvantages of using temporal separation in a computing system.

18. Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

19. Suggest an efficient scheme for maintaining a per-user protection scheme. That is, the system maintains one directory per user, and that directory lists all the objects to which the user is allowed access. Your design should address the needs of a system with 1000 users, of whom no more than 20 are active at any time. Each user has an average of 200 permitted objects; there are 50,000 total objects in the system.

20. A flaw in the protection system of many operating systems is argument passing. Often a common shared stack is used by all nested routines for arguments as well as for the remainder of the context of each calling process. Explain what vulnerabilities this flaw presents. Explain how the flaw can be controlled. The shared stack is still to be used for passing arguments and storing context.

Reference no: EM131131664

Questions Cloud

How would kin selection explain stevens behavior : How would kin selection explain Steven's behavior? How would norm of reciprocity explain Steven's behavior? How would social exchange theory explain Steven's behavior? Give some examples of the benefits and costs of helping in this situation.
Derive conditional distribution : Derive marginal distribution of x and y. Derive conditional distribution of y given x = 0 and x = 1 separately.  Prove the "law of iterated expectations" i.e. E[y]=E[E[y¦x]]
Discuss current and future professional development goal : Professional Portfolio Marketing Plan (PORTFOLIUM PURPOSE):- What professional development goals are of the highest priority to you in your current situation and what goals do you think may emerge in the future?
Have you ever encountered a filter bubble : What are you thoughts about companies collecting data about you? Do you feel this type of data collection is a beneficial or detrimental? Why? Do you feel you have a right to know what data companies are collecting about you? Does this concern you..
How a fence register is used for relocating a user program : What are some other modes of access that users might want to apply to code or data, in addition to the common read, write, and execute permission? If two users share access to a segment, they must do so by the same name. Must their protection rig..
Would you say you are living the good life why or why not : Would you say you are living "the good life?" Why or why not? If you could make any changes you wished that would make you happier, what would those be?
Review the given case study and write a paper : Review the case study below and in your paper, address the following:- Explain how you would approach this employee.- Describe how you think the employee will respond.
Define and briefly explain leptokurtic distribution : Brain teaser here yes you are honored experts Define and briefly explain leptokurtic distribution
What the value of first order autocorrelation coefficient : If a Durbin Watson statistic takes a value close to zero, what will be the value of the first order autocorrelation coefficient

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain potential problem with new technology

Parker Earth Moving: Potential Problem with new Technology - Relevant to the situation facing the company is the fact that the Information Technology Department exists in name only. The department is understaffed and the department manager is ill-t..

  Discuss three major challenges that typically users face in

discuss three major challenges that typically users face in building andor using information systems and elaborate the

  Comparing relational databases and spreadsheetshow are

comparing relational databases and spreadsheetshow are relational databases and spreadsheets both similar and

  Supply chain management and organizational

supply chain management and organizational profitabilityresearch a company that uses supply chain management scm and

  Should non-it managers allocate funding for it initiatives

IT Initiatives Strategies - Should non-IT managers allocate funding for IT initiatives?

  Write an application that meets list of provided functional

ITECH2100 Assignment: Processing Log Files of a Computer Management System. This assignment requires you to write an application that meets a list of provided functional and design requirements, utilising the concepts and techniques taught in this ..

  Describe the steps of the systems development life cycle

Your assignment should describe the steps of the Systems Development Life Cycle (SDLC) discussed in Topic 4 of the subject.

  Service operations queues

How are people waiting in queues in service operations similar to buffering inventories in manufacturing and in what ways are they different

  Information security program

Describe the difference between corporate investigations and law enforcement investigations and determine why corporate investigations are an integral part of an information security program.

  Discuss best practice you would employ to keep your customer

Directions: Write a paper that includes the following: A description of the following business models: brick-and-mortar, e-business and e-commerce and For each model, discuss best practices you would employ to keep your customers' personal data safe

  Organizations are becoming more socially conscience

Organizations are becoming more socially conscience or less - Do you think organizations are becoming more socially conscience or less?

  Need this paper to cover subjects such as cryptography

Need this paper to cover subjects such as cryptography, programming, networking, with a focus on the security of information and the challenges facing information security.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd