Question: 1 . The design principles discussed in this module are important because by following them, we can ensure a . correctness of the TCB .
The design principles discussed in this module are important because by following them, we can ensure a correctness of the TCB b reduced likelihood and impact of an attack. c better performance for the TCB d automation of security.
An electronic health record EHR system purchased by a hospital system comes with default permissions set such that any healthcare worker eg doctors, nurses etc. is allowed to access any patient record. This EHR system violates the following design principle. a Defenseindepth b Separation of privilege c Failsafe default dUser acceptability Least common mechanism is another design principle that states a system should minimize the number of mechanisms that allow different applications to interact with each other. This is motivated by the following. a Interaction between mutually untrusting applications potentially allows a compromise in one to propagate to another one. b Adding more common mechanisms could increase system complexity. c Isolation is good for security which could potentially be overcome by an insecure common mechanism. dAll three of the other answers Safe deposit boxes in banks require two keys to unlock them. One of the keys is held by the bank and the other key is made available to the safe deposit box owner. From a security perspective, this is explained by the following design principle. a User acceptability b Separation of privilege. cLeast privilege. d Failsafe default In popular operating systems, privileges are associated with user or group identifiers. This allows any process running on behalf of a user U to access all resources to which U has access. This could violate the following design principle. a Failsafe default. bOpen design.
c Least privilege. d User acceptability.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
