What was introduced for circumventing difficulties in classic approaches to computer security by limiting damages produced by malicious programs?

What was introduced for circumventing difficulties in classic approaches to computer security by
limiting damages produced by malicious programs?

What was introduced for circumventing difficulties in classic approaches to computer security by
limiting damages produced by malicious programs?

A.
Integrity-preserving

B.
Reference Monitor

C.
Integrity-monitoring

D.
Non-Interference

Explanation:
“reference monitor … mediates all access subjects have to objects … protect the objects from
unauthorized access and destructive modification” , Ibid p 273
Reference monitor is part of the TCB concept
Not D: “noninterference … is implemented to ensure that any actions that take place at a higher
security level do not affect … actions that take place at a lower level”, Harris, 3rd Ed, p 290.
It is part of the information flow model.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Jamal Ahmed

Jamal Ahmed

check