Home Random Page


CATEGORIES:

BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism






After text activity

VII. Reading Exercises:

Exercise 1.Read and memorize using a dictionary:

Currently, accountable for, confusion, extra piece of hardware, impenetrable, contents, executing program, integrity, responsible, to perform, to load, requester

 

Exercise 2.Answer the questions:

1) What might one expect the supervisor program to maintain?

2) What does virtual processor implementation contain?

3) What protection mechanisms are described in the text?

4) What does each mechanism protect?

5) What program is part of all three protection mechanisms?

 

Exercise 4.Match the left part with the right:

1 So far, this virtual processor implementation contains a) three protection mechanisms that we can associate with our abstractions.
2. For the first, the information being protected is the   b) forces all references to memory through the descriptor mechanism.
3. The guard is represented by the extra   c) distinct programs of Fig. 1.
4. The impenetrable wall with a door is the hardware that d) piece of hardware that enforces the descriptor restriction.

 

THE SPEAKING MODULE

II. Speaking Exercises:

Exercise 1.Define the terms using the suggested words and expressionsas in example:

Information science Descriptor Code Binary code
discipline, deals with, processes, storing,transferring, information piece stored data indicates how data stored system, symbols, rules, used, expressing, information code, digital, computers, based, binary, number, system, there are, two, possible, states, off and on, usually, symbolized, 0 and 1  

 

EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.

 

Exercise 2.Ask questions to the given answers:

1)Question: ___________________________________________ ?

Answer: When the privileged state bit is OFF, the index in this table of the program currently in control identifies exactly which program--and thus which virtual processor--is accountable for the activity of the real processor.

 

2) Question: ___________________________________________ ?

Answer: For protection to be complete, a virtual processor must not be able to change arbitrarily the values in the table of descriptors.

 

3)Question: ___________________________________________ ?

Answer: If we suppose the table to be stored inside the supervisor program, it will be inaccessible to the virtual processors.

 

 

THE WRITING MODULE

 

Writing exercises:

Exercise 1.Fill in the gaps with the suggested words:

requester, not, first, identified, mechanism

The second ________protects the contents of the descriptor register. The wall, door, and guard are implemented in hardware, as with the ______mechanism. An executing program requesting to load the descriptor register is__________ by the privileged state bit. If this bit is OFF, indicating that the requester is a user program, then the guard does ______allow the register to be loaded. If this bit is ON, indicating that the______ is the supervisor program, then the guard does allow it.



 

Exercise 2. Compose a story on one of the topics (up to 100 words):

1) Different protection mechanisms

2) Authority check

 

 

Lesson 8

The Reading Module

Read the text:

With an appropriately sophisticated and careful supervisor program, we now have an example of a system that completely isolates its users from one another. Similarly isolated permanent storage can be added to such a system by attaching some longterm storage device (e.g., magnetic disk) and developing a similar descriptor scheme for its use. Since long-term storage is accessed less frequently than primary memory, it is common to implement its descriptor scheme with the supervisor programs rather than hardware, but the principle is the same. Data streams to input or output devices can be controlled similarly. The combination of a virtual processor, a memory area, some data streams, and an isolated region of long-term storage is known as a virtual machine.14

Long-term storage does, however, force us to face one further issue. Suppose that the virtual machine communicates with its user through a typewriter terminal. If a new user approaches a previously unused terminal and requests to use a virtual machine, which virtual machine (and, therefore, which set of long-term stored information) should he be allowed to use? We may solve this problem outside the system, by having the supervisor permanently associate a single virtual machine and its long-term storage area with a single terminal. Then, for example, padlocks can control access to the terminal. If, on the other hand, a more flexible system is desired, the supervisor program must be prepared to associate any terminal with any virtual machine and, as a result, must be able to verify the identity of the user at a terminal. Schemes for performing this authentication are the subject of our next example.

4) Authentication Mechanisms: Our second example is of an authentication mechanism: a system that verifies a user's claimed identity. The mechanics of this authentication mechanism differ from those of the protection mechanisms for implementing virtual machines mainly because not all of the components of the system are under uniform physical control. In particular, the user himself and the communication system connecting his terminal to the computer are components to be viewed with suspicion. Conversely, the user needs to verify that he is in communication with the expected computer system and the intended virtual machine. Such systems follow our abstract model of a guard who demands a match between something he knows and something the requester possesses. The objects being protected by the authentication mechanism are the virtual machines. In this case, however, the requester is a computer system user rather than an executing program, and because of the lack of physical control over the user and the communication system, the security of the computer system must depend on either the secrecy or the unforgeability of the user's identification.

In time-sharing systems, the most common scheme depends on secrecy. The user begins by typing the name of the person he claims to be, and then the system demands that the user type a password, presumably known only to that person.

There are, of course, many possible elaborations and embellishments of this basic strategy. In cases where the typing of the password may be observed, passwords may be good for only one use, and the user carries a list of passwords, crossing each one off the list as he uses it. Passwords may have an expiration date, or usage count, to limit the length of usefulness of a compromised one.

The list of acceptable passwords is a piece of information that must be carefully guarded by the system. In some systems, all passwords are passed through a hard-to-invert transformation15 before being stored, an idea suggested by R. Needham [37, p. 129]. When the user types his password, the system transforms it also and compares the transformed versions. Since the transform is supposed to be hard to invert (even if the transform itself is well known), if the stored version of a password is compromised, it may be very difficult to determine what original password is involved. It should be noted, however, that "hardness of inversion" is difficult to measure. The attacker of such a system does not need to discern the general inversion, only the particular one applying to some transformed password he has available.

 

 


Date: 2016-01-03; view: 847


<== previous page | next page ==>
After text activity | After text activity
doclecture.net - lectures - 2014-2024 year. Copyright infringement or personal data (0.008 sec.)