What is used to protect programs from all unauthorized modification or executional interference?
A.
A protection domain
B.
A security perimeter
C.
Security labels
D.
Abstraction
Explanation:
A protection domain consists of the execution and memory space assigned to each process. The purpose of
establishing a protection domain is to protect programs from all unauthorized modification or executional
interference. The security perimeter is the boundary that separates the Trusted Computing Base (TCB) from
the remainder of the system. Security labels are assigned to resources to denote a type of classification.
Abstraction is a way to protect resources in the fact that it involves viewing system components at a high level
and ignoring its specific details, thus performing information hiding.
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, John Wiley & Sons, 2001, Chapter 5: Security Architecture and Models (page 193).