Give an example of the use of temporal separation for security in a computing environment.

What will be an ideal response?

In some secure systems, only processes of one sensitivity level are run at one time. When a batch of tasks requiring higher or lower security are to be run, all tasks are removed from the system, storage media containing sensitive data and programs are removed and new ones installed, and the operating system is rebooted.

Computer Science & Information Technology

You might also like to view...

When is business continuity needed?

a. When business processes are threatened b. When business processes are interrupted c. When new software is distributed d. When a user steals company data

Computer Science & Information Technology

The ANY, ALL, and SOME predicates are ________________.

a. comparison operators b. comparison predicates c. quantified predicates d. quantified operators

Computer Science & Information Technology