QUESTION If a Biba security mocel is implemented in an Operating System to prote
ID: 3902102 • Letter: Q
Question
QUESTION If a Biba security mocel is implemented in an Operating System to protect the kernel level device drivers, then applicaticns (trom user level) can't access these device drivers applications (from user level) can access these device drivers bu: not change them kernel level processes can't read the application level processes kernel level processes can access services prcvided by application (user) level processes QUESTION 2 A vulnerability in software or operatng system can result in an attack at any time is an attack already is a threat due to an exploit will result in an atack soonExplanation / Answer
Answer:
applications ( from user level) can access these device drivers but not change them .
This security model is coordinated toward information integrity (as opposed to classification) and is described by the expression: "read up, write down". This is rather than the Bell-LaPadula model which is described by the expression "read down, write up".
In the Biba model, clients can just make content at or beneath their own integrity level (a priest may write a supplication book that can be read by ordinary people, however not one to be read by a consecrated minister). On the other hand, clients can just view content at or over their own integrity level (a priest may read a book composed by the consecrated minister, yet may not read a leaflet composed by a modest average citizen).
2. can result in an attack at any time
This is a weakness in a system which may result an attack from a hacker.
DEAR PLEASE DO RATE IT IF HELPS ELSE LET ME KNOW YOUR DOUBT.
THANK YOU!!!
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.