Page 288 - DCAP103_Principle of operating system
P. 288

Unit 8: System Protection



            Self Assessment                                                                       Notes

            Multiple choice questions:

               4.  What is the use of Chinese Wall?
                 (  a)  To address conflict-of-interest issues related to consulting activities within banking
                    and other financial disciplines.
                 (  b)  To address conflict-of-interest issues related to consulting activities within college
                    and other Institutional disciplines.
                 (  c)  To address conflict of-interest issues related to consulting activities within government
                    offices.
                 (  d)  All of the above.

               5.  What is Access Control List?
                 (  a)  A list associated with an object that specifies all the objects that can access the subject,
                    along with their rights to the object.

                 (  b)  A list associated with an object that specifies all the subjects that can access the object,
                    along with their rights to the object.
                 (  c)  A list associated with a subject that specifies all the subjects that can access the object,
                    along with their rights to the object.
                 (  d)  None of the above.
               6.  What is Discretionary Access Control (DAC)?

                 (  a)  DAC leaves a certain amount of access control to the discretion of the object’s owner
                    or anyone else who is not authorized to control the object’s access.
                 (  b)  DAC leaves a certain amount of access matrix to the discretion of the object’s owner
                    or anyone else who is authorized to control the object’s access.
                 (  c)  DAC leaves a certain amount of access control to the discretion of the object’s owner
                    or anyone else who is authorized to control the object’s access.
                 (  d)  All of the above.

            Fill in the blanks:
               7.  ......................  control is concerned with determining the  allowed activities of legitimate
                 uses.
               8.  ...................... is an entity that contains or receives information in the access control research
                 community.


            8.6 Summary

               •  The processes in an operating system must be protected from one another’s activities.
               •  Implementation of protection in an OS generally involves three factors.
               •  Access matrices are widely used to hold a symbolic representation of the set of rights
                 available to the subjects for access to objects.
               •  Access control is concerned with determining the allowed activities of legitimate users,
                 mediating every attempt by a user to access a resource in the system.
               •  Capability systems were first described in the literature in the mid-1960’s.



                                             LOVELY PROFESSIONAL UNIVERSITY                                   281
   283   284   285   286   287   288   289   290   291   292   293