Unformatted text preview: 12. Describe the concept of Discretionary Access Control and Mandatory Access Control. What are their limitations. [Chapter 4 slides 45-53] 13. What is Covert Channel? What is the mechanism of providing security function using covert channel? State the differences between Covert Storage Channel and Covert Timing Channel. [Chapter 4 slides 46-62] 14. What is Resource Matrix? How can it be used to unveil the existence of covert channels? [Chapter 4 slides 63-64] 15. What are privileges and roles? How attacker uses privilege and role to attack the computer? [Chapter 4 slides 67-71] 16. What is transformation and revocation? How attacker uses transformation and revocation to attack the computer? [Chapter 4 slides 72-74] 17. State the principles of secret kernel and how to make secret kernel difficult to be un-infiltrated. [Chapter 4 slides 75-80]...
View Full Document
- Winter '11
- Cryptography, Discretionary Access Control, logistic security approach