computer security



Автор Girl задал вопрос в разделе ВУЗы, Колледжи

текст на англ. яз. , тема - компьютерная безопасность (или хотя бы касаемо компьютера) и получил лучший ответ

Ответ от Макс[гуру]
Secure operating systems [edit] Main article: Security-focused operating system One use of the term computer security refers to technology to implement a secure operating system. Much of this technology is based on science developed in the 1980s and used to produce what may be some of the most impenetrable operating systems ever. Though still valid, the technology is in limited use today, primarily because it imposes some changes to system management and also because it is not widely understood. Such ultra-strong secure operating systems are based on operating system kernel technology that can guarantee that certain security policies are absolutely enforced in an operating environment. An example of such a Computer security policy is the Bell-LaPadula model. The strategy is based on a coupling of special microprocessor hardware features, often involving the memory management unit, to a special correctly implemented operating system kernel. This forms the foundation for a secure operating system which, if certain critical parts are designed and implemented correctly, can ensure the absolute impossibility of penetration by hostile elements. This capability is enabled because the configuration not only imposes a security policy, but in theory completely protects itself from corruption. Ordinary operating systems, on the other hand, lack the features that assure this maximal level of security. The design methodology to produce such secure systems is precise, deterministic and logical. Systems designed with such methodology represent the state of the art[clarification needed] of computer security although products using such security are not widely known. In sharp contrast to most kinds of software, they meet specifications with verifiable certainty comparable to specifications for size, weight and power. Secure operating systems designed this way are used primarily to protect national security information, military secrets, and the data of international financial institutions. These are very powerful security tools and very few secure operating systems have been certified at the highest level (Orange Book A-1) to operate over the range of "Top Secret" to "unclassified" (including Honeywell SCOMP, USAF SACDIN, NSA Blacker and Boeing MLS LAN.) The assurance of security depends not only on the soundness of the design strategy, but also on the assurance of correctness of the implementation, and therefore there are degrees of security strength defined for COMPUSEC. The Common Criteria quantifies security strength of products in terms of two components, security functionality and assurance level (such as EAL levels), and these are specified in a Protection Profile for requirements and a Security Target for product descriptions. None of these ultra-high assurance secure general purpose operating systems have been produced for decades or certified under Common Criteria. In USA parlance, the term High Assurance usually suggests the system has the right security functions that are implemented robustly enough to protect DoD and DoE classified information. Medium assurance suggests it can protect less valuable information, such as income tax information. Secure operating systems designed to meet medium robustness levels of security functionality and assurance have seen wider use within both government and commercial markets. Medium robust systems may provide the same security functions as high assurance secure operating systems but do so at a lower assurance level (such as Common Criteria levels EAL4 or EAL5). Lower levels mean we can be less certain that the security functions are implemented flawlessly, and therefore less dependable. These systems are found in use on web servers, guards, database servers, and management hosts and are used not only to protect the data stored on these systems but also to provide a high level of protection for network connections and routing services.

Ответ от 3 ответа[гуру]
Привет! Вот подборка тем с ответами на Ваш вопрос: текст на англ. яз. , тема - компьютерная безопасность (или хотя бы касаемо компьютера)

Как перевести с английского (технический перевод):
1. Произошло переполнение символьного буфера.
2. Переполнение входного буфера.
подробнее...

Как удалить Кaspersky Endpoint Security 10?
Лучше в безопасном режиме Revo.Ininstaller.Pro+Portable+rus. (для удаления антивируса в безопасном
подробнее...

Не удаляется Trend Micro Internet Security через кдаление программ. Как удалить?
если через родной деинсталятор не помогает, то через программу унклокер.. . удалит все!..
подробнее...
Ответ от 3 ответа[гуру]
Привет! Вот еще темы с похожими вопросами:
спросили в User as 0 User az 0
Привет всем) вопрос по спецификации base64
В спецификации все четко написано!! !

8. Security Considerations

When
подробнее...

подскажите пожалуйста, какую винду лучше поставить 32, 64 или 86-разрядную и вообще, какого семейства???
антивирусная программа не у системы и операционки. Ты должен его скачать ( Kaspersky Internet
подробнее...
спросили в User ba User be
IAAnotif.exe что это за процесс? Monitor User Notification Tool
iaanotif.exe is a process belonging to the Application Accelerator from Intel. It changes the
подробнее...
спросили в Microsoft Research
что это за вирус EICAR-Test-File?
Материал из Википедии — свободной энциклопедии

EICAR (или EICAR-Test-File — от European
подробнее...
спросили в Железо Exe
процесс uns.exe. Стоит семерка этот процесс жрет 25 цп. Это нормально?
Процесс User Notification Service принадлежит программе Intel(R) Active Management Technology User
подробнее...
спросили в Железо
distnoted.exe что за процесс? нужен ли он
Процесс distnoted принадлежит программе Apple Mobile Device Support или Apple Application Support
подробнее...
спросили в A+E Networks
помогите пожалуйста с сочинением по английскому тема "интернет"
Internet and Modern Life

The Internet has already entered our ordinary life. Everybody
подробнее...
спросили в Интернет
Бесплатная и вечная активация Eset nod 32 Любой версии
а если ты сидишь в подполье одного из самых крутых сайтов то ключи на всё это барахло можно брать
подробнее...
спросили в Интернет
Здравствуйте, подскажите пож-ста, что значит на вашем компе отключены Cookies как их включить????
Если Вы пользуетесь браузером Opera, то на верхней панеле нажмите вкладку Инструменты, затем
подробнее...
 

Ответить на вопрос:

Имя*

E-mail:*

Текст ответа:*
Проверочный код(введите 22):*