Page 317 - DCAP103_Principle of operating system
P. 317
Principles of Operating Systems
Notes 6. What are the two advantages of encrypting data stored in the computer system?
7. Why does not D(kd , N)(E(ke , N)(m)) provide authentication of the sender? To what uses
can such an encryption be put?
8. Discuss, what you know about system security.
9. Explain in detail the program threats in system security.
10. Explain the networking threats with examples.
11. What is the role of the cryptography in system security?
12. What is the difference between program threads and networking threads?
13. Briefly describe about the authentication in system security.
14. Describe the role of firewall in system security.
15. Differentiate between implementing security defense and firewall.
Answers to Self Assessment
1. (a) 2. (d) 3. True 4. False
5. Cryptography 6. encryption 7. IPSEC 8. Transact-SQL
9. Cipher Block Chaining (CBC) 10. firewall
9.10 Further Readings
Operating Systems, by Andrew Tanenbaum, Albert S. Woodhull.
Operating Systems, by Harvey M. Deitel, Paul J. Deitel, David R. Choffnes.
wiley.com/coolege.silberschatz
310 LOVELY PROFESSIONAL UNIVERSITY