Explain the concept of a trusted computing base

Assignment Help Management Information Sys
Reference no: EM132305941

ESSAY QUESTIONS

Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words).

1. Not all information has the same importance and value to a company. How data is classified is an important factor used in determining the amounts of funding and resources that should be applied to protecting each type of data. Describe the data classification levels within commercial and military organizations and provide examples of the types of information that would be classified at each classification level.

2. It takes a team of individuals throughout the organization working together to safeguard the integrity and confidentiality of data resources. Describe the layers of responsibility within an organization when it comes to asset security and data protection. For each role, discuss their responsibility within the organization for asset security.

3. The architecture of a computer system is very important and comprises many topics. The system must ensure that memory is properly segregated and protected, ensure that only authorized subjects access objects, ensure that untrusted processes cannot perform activities that would put other processes at risk, control the flow of information, and define a domain of resources for each subject.

It also must ensure that if the computer experiences any type of disruption, it will not result in an insecure state. Many of these issues are dealt with in the system's security policy, and the security mode is built to support the requirements of this policy.

Explain the concept of a trusted computing base and describe how it is used to enforce the system's security policy. Provide examples of specific elements (hardware, software or firmware) in the architecture of the computer system could be used that provide security within the TCB.

Reference no: EM132305941

Questions Cloud

What do you think of wall street : What do you think of Wall Street? Do we need Wall Street? Why or Why not? What is "The Paradox of Thrift"? How does that apply to our current situation?
Describe the four basic ways of handling risk : Explain the methods used to assess risk from a qualitative perspective where intangible values are evaluated such as the seriousness of the risk or ramification
What are the potential benefits and downsides of unionizing : You are a non-union employee of a large hotel chain in Chicago, earning $15/hour, in a position you have held for several years. Some nearby hotels--though not.
Consumer behaviour literature analysis : Critically analyse and understand the driving forces of perception, attitudes, motivation, group and individual differences, culture, family and lifestyle
Explain the concept of a trusted computing base : Explain the concept of a trusted computing base and describe how it is used to enforce the system's security policy.
How would you ensure the highest level of accuracy : Create a new thread. As indicated above, identify which of the three views discussed in the chapter that would provide the best quality assessment.
How does this affect the hr manager hiring decisions : For each applicant, the HR manager gathers information by trying to verify various claims on resumes, but some doubt about fit always lingers when a decision.
Discuss the strengths of symmetric key cryptograph : discuss the strengths and weaknesses of symmetric key cryptography and give an example of where this type of cryptography is used.
Define how you could use the systems analysis tools : Review the explanation of the "5-Whys" in the Weekly Briefing for this week. Also review the material on simple gap analysis. Think about how you could use.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd