Reference Monitors are an abstraction necessary for enforcement ofsecurity polic
ID: 3612357 • Letter: R
Question
Reference Monitors are an abstraction necessary for enforcement ofsecurity policies. Use the IEEE Library and Google (ReferenceMonitors + Operating Systems) for more information on referencemonitors. Why do we need an abstraction of the ReferenceMonitor? Is not the implementation of the Reference Monitor in thekernel enough? Given the implementation of the Reference Monitor,why is it important for it to be secure? Give an example of apossible exploit of a reference monitor and the resulting effectson the operating system.Explanation / Answer
Abstraction provides a way of suppressingdetails that are not relevant to the situation at hand. Thisis our means of coping with complexity. Abstraction doesn't reduce the totalnumber of details that have to be dealtwith; but, it provides a way of organizingthose details so that we only have tothink about a few of them at a time. Withoutabstraction, we couldn't do tractable proofs. To keep them tractable, we needabstraction both in our theories and in the systems we build. so the implementation ofthe Reference Monitor in the kernel enough is notenough
It is widely acceptedthat a system is secure if and only ifit produces a sequence of securestates There is a pressing need forthis redevelopment because we are nowbeginning to build a computer securityindustry, and it is very important that it be built on solidfoundations so Given the implementationof the Reference Monitor, it is important for it to besecure. This approach minimizesunintentional or intentional damage to the system and ensures thatthe system behaves in an understandable and consistentfashion
If users can breach the referencemonitor’s integrity, either intentionally or accidentally,then the system cannot be trusted to behave correctly.Consequently, the OS kernel, which contains the reference monitor,must resist any attempts atmodification.
Abstraction provides a way of suppressingdetails that are not relevant to the situation at hand. Thisis our means of coping with complexity. Abstraction doesn't reduce the totalnumber of details that have to be dealtwith; but, it provides a way of organizingthose details so that we only have tothink about a few of them at a time. Withoutabstraction, we couldn't do tractable proofs. To keep them tractable, we needabstraction both in our theories and in the systems we build. so the implementation ofthe Reference Monitor in the kernel enough is notenough
It is widely acceptedthat a system is secure if and only ifit produces a sequence of securestates There is a pressing need forthis redevelopment because we are nowbeginning to build a computer securityindustry, and it is very important that it be built on solidfoundations so Given the implementationof the Reference Monitor, it is important for it to besecure. This approach minimizesunintentional or intentional damage to the system and ensures thatthe system behaves in an understandable and consistentfashion
If users can breach the referencemonitor’s integrity, either intentionally or accidentally,then the system cannot be trusted to behave correctly.Consequently, the OS kernel, which contains the reference monitor,must resist any attempts atmodification.
It is widely acceptedthat a system is secure if and only ifit produces a sequence of securestates There is a pressing need forthis redevelopment because we are nowbeginning to build a computer securityindustry, and it is very important that it be built on solidfoundations so Given the implementationof the Reference Monitor, it is important for it to besecure. This approach minimizesunintentional or intentional damage to the system and ensures thatthe system behaves in an understandable and consistentfashion
If users can breach the referencemonitor’s integrity, either intentionally or accidentally,then the system cannot be trusted to behave correctly.Consequently, the OS kernel, which contains the reference monitor,must resist any attempts atmodification.
There is a pressing need forthis redevelopment because we are nowbeginning to build a computer securityindustry, and it is very important that it be built on solidfoundations so Given the implementationof the Reference Monitor, it is important for it to besecure. This approach minimizesunintentional or intentional damage to the system and ensures thatthe system behaves in an understandable and consistentfashion
If users can breach the referencemonitor’s integrity, either intentionally or accidentally,then the system cannot be trusted to behave correctly.Consequently, the OS kernel, which contains the reference monitor,must resist any attempts atmodification.
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.