4.10. Exercises
1: | Give an example of the use of physical separation for security in a computing environment. |
2: | Give an example of the use of temporal separation for security in a computing environment. |
3: | Give an example of an object whose security level may change during execution. |
4: | Respond to the allegation “An operating system requires no protection for its executable code (in memory) because that code is a duplicate of code maintained on disk.” |
5: | Explain how a fence register is used for relocating a user's program. |
6: | Can any number of concurrent processes be protected from one another by just one pair of base/bounds registers? |
7: | The discussion of base/bounds registers implies that program code is execute-only and that data areas are read-write-only. ... |
Get Security in Computing, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.