- •Basic principles of information protection a. Considerations Surrounding the Study of Protection
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •B. Technical Underpinnings
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
-
Reading Exercises:
Exercise 1. Read and memorize using a dictionary:
Currently, accountable for, confusion, extra piece of hardware, impenetrable, contents, executing program, integrity, responsible, to perform, to load, requester |
Exercise 2. Answer the questions:
-
What might one expect the supervisor program to maintain?
-
What does virtual processor implementation contain?
-
What protection mechanisms are described in the text?
-
What does each mechanism protect?
-
What program is part of all three protection mechanisms?
Exercise 4. Match the left part with the right:
1 So far, this virtual processor implementation contains |
a) three protection mechanisms that we can associate with our abstractions. |
2. For the first, the information being protected is the
|
b) forces all references to memory through the descriptor mechanism. |
3. The guard is represented by the extra
|
c) distinct programs of Fig. 1. |
4. The impenetrable wall with a door is the hardware that |
d) piece of hardware that enforces the descriptor restriction. |
THE SPEAKING MODULE
II. Speaking Exercises:
Exercise 1. Define the terms using the suggested words and expressions as in example:
Information science |
Descriptor |
Code |
Binary code |
discipline, deals with, processes, storing,transferring, information |
piece stored data indicates how data stored |
system, symbols, rules, used, expressing, information |
code, digital, computers, based, binary, number, system, there are, two, possible, states, off and on, usually, symbolized, 0 and 1
|
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.
Exercise 2. Ask questions to the given answers:
1)Question: ___________________________________________ ?
Answer: When the privileged state bit is OFF, the index in this table of the program currently in control identifies exactly which program--and thus which virtual processor--is accountable for the activity of the real processor.
2) Question: ___________________________________________ ?
Answer: For protection to be complete, a virtual processor must not be able to change arbitrarily the values in the table of descriptors.
3)Question: ___________________________________________ ?
Answer: If we suppose the table to be stored inside the supervisor program, it will be inaccessible to the virtual processors.