The document contains an assignment with 10 questions related to computer system security topics such as confinement principles, system call interposition, rootkit detection and prevention, software fault isolation, intrusion detection systems, goal and solution approaches, SFI approaches, virtual OS approaches, privilege dropping, and virtual based isolation. The assignment is from Bharat Institute of Engineering, Meerut for third semester students studying subjects like computer science, information technology, mechanical engineering, electronics and communication, and electronics engineering.
The document contains an assignment with 10 questions related to computer system security topics such as confinement principles, system call interposition, rootkit detection and prevention, software fault isolation, intrusion detection systems, goal and solution approaches, SFI approaches, virtual OS approaches, privilege dropping, and virtual based isolation. The assignment is from Bharat Institute of Engineering, Meerut for third semester students studying subjects like computer science, information technology, mechanical engineering, electronics and communication, and electronics engineering.
The document contains an assignment with 10 questions related to computer system security topics such as confinement principles, system call interposition, rootkit detection and prevention, software fault isolation, intrusion detection systems, goal and solution approaches, SFI approaches, virtual OS approaches, privilege dropping, and virtual based isolation. The assignment is from Bharat Institute of Engineering, Meerut for third semester students studying subjects like computer science, information technology, mechanical engineering, electronics and communication, and electronics engineering.
Subject: Computer System Security (KNC-301) Unit: 2 Assignment-2
1. What is the significance of Confinement Principles?
2. Write short notes on System Call Interposition. 3. How to detect rootkits? And explain how to prevent rootkits. 4. Explain the need of Software Fault Isolation with suitable example. 5. What is Intrusion Detection System and what are the difficulties of anomalies detection? 6. Write short notes on the following i) Goal and Solution ii) SFI Approach 7. How are the different approach to use virtual OS on desktop? 8. When changing effective user id distinguish between ways to drop privilege? 9. What do you by virtual based isolation? Explain with suitable example. 10. Discuss about error 404 digital hacking in India part-2