This preview shows page 1. Sign up to view the full content.
Unformatted text preview: 11. Describe the concept of Discretionary Access Control and Mandatory Access Control. What are their limitations. 12. What is Covert Channel? What is the mechanism of providing security function using covert channel? State the differences between Covert Storage Channel and Covert Timing Channel. 13. What is Resource Matrix? How can it be used to unveil the existence of covert channels? 14. What are privileges and roles? How attacker uses privilege and role to attack the computer? 15. What is transformation and revocation? How attacker uses transformation and revocation to attack the computer? 16. State the principles of secret kernel and how to make secret kernel difficult to be un-infiltrated....
View Full Document
This note was uploaded on 01/11/2012 for the course EE EE4215 taught by Professor Drcheng during the Winter '11 term at City University of Hong Kong.
- Winter '11