Page 85 - DCAP516_COMPUTER_SECURITY
P. 85

Unit 7: Designing Trusted Operating System




          6.   Digital Equipment Corporation (Ultrix)                                           Notes
          7.   Gemini Computers (GEMSOS)
          8.   Harris Corporation (SVR3, SVR4)
          9.   Hewlett-Packard (HP/UX)

          10.  Honeywell (Multics)
          11.  IBM (OS/390, AIX)
          12.  SCO (SCO Unix)
          13.  Secure Computing Corporation (LOCK, Mach, BSD)

          14.  SecureWare (Apple A/UX, HP/UX, SCO)
          15.  Sequent (Dynix/ptx)
          16.  Silicon Graphics (IRIX)
          17.  Sun Microsystems (SunOS, Solaris)

          18.  Trusted Information Systems (Xenix, Mach)
          19.  BAE Systems (XTS Unix)

          7.5.1 Trust in What?

          1.    Process: OS processes must be absent of security flaws and malicious segments
          2.    Product: It must be evaluated, approved product.

          3.    Software: The software must be Part trusted to enforce security policy
          4.    Computing base
          5.    HW/SW/firmware enforcing unified policy.
          6.    System
          7.    Trusted to process sensitive information


          7.5.2 Features of Trusted OS

          There are many unique features which distinguish an Trusted OS from an Ordinary OS. These
          have been listed below:
          1.    User identification and authentication

          2.    Mandatory access controls
          3.    Discretionary access controls
          4.    Object reuse protection

          5.    Complete mediation
          6.    Trusted paths
          7.    Audits
          8.    Audit log reduction
          9.    Intrusion detection




                                           LOVELY PROFESSIONAL UNIVERSITY                                   79
   80   81   82   83   84   85   86   87   88   89   90