Text_Exercise_week2 - 5.5 Exercises 1 Give an example of the use of physical separation for security in a computing environment The physical separation

Text_Exercise_week2 - 5.5 Exercises 1 Give an example of...

This preview shows page 1 - 2 out of 4 pages.

5.5 Exercises 1. Give an example of the use of physical separation for security in a computing environment. The physical separation uses different physical objects for different users. The operating system is separated at the physical level. This will use different processes for different objects. The example can be a keyboard, and printer. The keyboard is an input device, and may not require security. The printer is an output device and needs secured access, and prevent unauthorized access. 2. Give an example of the use of temporal separation for security in a computing environment. The Temporal separation executes different programs at different times. The Temporal Separation is the process of providing different security requirements that were executed at different times. The processes require crucial level of security, in which the process may not be authorized for another user. 3. Give an example of an object whose sensitivity may change during execution. The Company’s datashould be secured, and data should be accessed by specific persons only. The data be encrypted, and this lower the overhead of security from the enforced security system. This will reduce the need for external security features applied on that data, because the data is encrypted. 4. Respond to the allegation “An operating system requires no protection for its executable code (in memory) because that code is a duplicate of code maintained on disk.” The allegation statement is not true. The executable code requires equal protection even though it’s a duplicate copy. The changes in temporary location will reflect in both the places. 5. Explain how a fence register is used for relocating a user’s program. The simplest form of memory protection is single-user operating systems, that prevent a faulty user program from destroying part of the resident portion of the operating system. The fence is a method to confine users to one side of a boundary. The fence was a predefined memory address, enabling the operating system to reside on one side and the user to stay on the other. This implementation is not flexible, because the space is reserved for the operating system, irrespective of the need. If less than the predefined space was required, the excess space was wasted. If the operating system needed more space, it could not grow beyond the fence boundary. The fence register protects in only one direction. It means an operating system can be protected from a single user, but the fence cannot protect one user from another user.
Image of page 1
Image of page 2

You've reached the end of your free preview.

Want to read all 4 pages?

  • Spring '16

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes