Assuming one link of the Trojan horse copy-and-observe-later
chain is broken. There are two other possible angles of
attack by Alice: Alice logging on and attempting to read the
string directly, and alice assigning a security level of
sensitive to the back-pocket file. Does the reference
monitor prevent these attacks?
Answer Posted / Ranjana Mishra
The Reference Monitor in the operating system's security architecture is responsible for enforcing access control policies and preventing unauthorized access. However, if Alice manages to log on as an authorized user or assign a sensitive security level to a back-pocket file, these actions might bypass the Reference Monitor since they are considered legitimate operations.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers