Cyber8836 Trusted OS design Flashcards
What are the four aspects of building a trusted OS?
Policy
Modeling
Design
Trust
What is the purpose of design in Trusted OS?
To show Policy enforcement is effective, correct and tamper resistant.
How can Object control sharing be accomplished?
List based and ticket based mechanism.
What is trusted Path?
It guarantees the user is actually talking to the machine and trusted component.
What does complete mediation mean?
Ever access attempt goes through the reference monitor.
What is object reuse prevention?
It is a mechanism that prevents scavenging of objects previously used by another program, so that information can not be leaked or stolen.
What is the trusted computing base?
It is the totality of protection mechanisms within a computer system - including hardware, firmware, and software - which is responsible for enforcing a security policy.
What does the Trusted computing Base include?
Hardware, Firmware
Primitive file system
Memory protection (RVM) Reference validation model
Inter process communication mechanisms
What are the two states of the machine?
User mode, Supervisor mode.
What is the purpose of the security kernel?
To consolidate security critical activities within the same permission level.
What system were all very high assurance solutions derived from?
Multics.