2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet362/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   358   359   360   361   362   363   364   365   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Process Isolation
Process isolation
requires that the operating system provide separate memory spaces for 
each process’s instructions and data. It also requires that the operating system enforce those 
boundaries, preventing one process from reading or writing data that belongs to another 
process. There are two major advantages to using this technique:

It prevents unauthorized data access. Process isolation is one of the fundamental 
requirements in a multilevel security mode system.

It protects the integrity of processes. Without such controls, a poorly designed process 
could go haywire and write data to memory spaces allocated to other processes, caus-
ing the entire system to become unstable rather than affecting only the execution of the 
errant process. In a more malicious vein, processes could attempt (and perhaps even 
succeed at) reading or writing to memory spaces outside their scope, intruding on or 
attacking other processes.
Many modern operating systems address the need for process isolation by implement-
ing virtual machines on a per-user or per-process basis. A virtual machine presents a user 
or process with a processing environment—including memory, address space, and other 
key system resources and services—that allows that user or process to behave as though 
they have sole, exclusive access to the entire computer. This allows each user or process to 
operate independently without requiring it to take cognizance of other users or processes 
that might be active simultaneously on the same machine. As part of the mediated access to 
the system that the operating system provides, it maps virtual resources and access in user 
mode so that they use supervisory mode calls to access corresponding real resources. This 
not only makes things easier for programmers, it also protects individual users and pro-
cesses from one another.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   358   359   360   361   362   363   364   365   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish