SECENG module Seminar 4 Group Project Continue your PGP project. In this week, we will concentrate on the following part: digital signatures and certificate chain. Try post messages signed with your...

1 answer below »

View more »
Answered Same DayDec 22, 2021

Answer To: SECENG module Seminar 4 Group Project Continue your PGP project. In this week, we will concentrate...

Robert answered on Dec 22 2021
121 Votes
A System is secured only when a computer system
Abstract:
Security of the system is a vital ingredient in any market and will be so in future. Its were most of the software technologists , research organization keep working on all ways to handle the security issues to make th
e computing-cyber world a better environment , free from any security threats. And these issues and the dealing possible solutions or concepts are discussed.
A System is secured only when a computer system is protected from corruption of data, loss of data due to interception, data getting destroyed or unauthorised use of the system and these can be prevented by a combination of only software and hardware, security policies. While these services of a secure system are called authentication, authorization, integrity, privacy and non repudiation. Currently there are a lot of developments going on in securing a system where various technologies and concepts are introduced. To begin with an earlier study by James Anderson has suggested that a secure system has to protect digital assets by enforcing some mechanism using these methods only to verify which does not change much, this led to the concept of Reference Monitors . Then comes the trusted computing concept and Palladium an allied work.
Reference monitors uses a set of rules on how a reference validation should be carried on, this enforces a set of policies for access control can be applied to any topic or context. It could be with processes , read and write on any objects on any system. Protection to these rules governing above said should be tamperproof, do complete validation which is also completely analysed and tested to correctness. This reference concept came from OS and hardware where the OS mediated between the access control and segmented memory registers, to be more specific the OS part that deals with this is called reference monitor. Now this concept of access control policy can be applied to authorized data source or repositories of any kind though this is simple but not fully equipped to handle all the issues in making a secure system. The MULTICS and other OS started to use this on their File systems too, later developed it into UNIX where they had several layers or rings of different privileges to access data/files.
Reference monitors are implemented by the concept of accessing all resources by processes or users by enforcing certain access control policies by using three important design specifics , first is mediation completely done between user or processes and data adhering to access rights or security policies . Validating is a procedure which uses a validation mechanism to check if access to the authorized data or information is allowed or not, though some sensitive operations still allowed to violate...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30