What is defined as the hardware, firmware and software elements of a trusted computing base that implement the reference monitor concept?
Which of the following security controls might force an operator into collusion with personnel assigned organizationally within a different function in order to gain access to unauthorized data?
What is called a system that is capable of detecting that a fault has occurred and has the ability to correct the fault or operate around it?
Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle?