473,386 Members | 1,835 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

system be totally secure

1
Suppose you are provided with several computer systems on the market. The systems include hardware, system software, applications, operating systems, DBMS and many others. Is it possible to enhance one of the computer systems such that it can be customized to be a totally standalone system, so much so that the system only processes and outputs the required results, no other external inputs and no upgrade of the system are required. Will this system be totally secure? Discuss from all possible perspectives. Your aim is to derive a 100% safe system. You must state all possible assumptions, constraints, etc.
Apr 1 '07 #1
1 1124
bartonc
6,596 Expert 4TB
Suppose you are provided with several computer systems on the market. The systems include hardware, system software, applications, operating systems, DBMS and many others. Is it possible to enhance one of the computer systems such that it can be customized to be a totally standalone system, so much so that the system only processes and outputs the required results, no other external inputs and no upgrade of the system are required. Will this system be totally secure? Discuss from all possible perspectives. Your aim is to derive a 100% safe system. You must state all possible assumptions, constraints, etc.
Looks like a homework question to me. Please read the Before you post your question sub section of the posting guidelines for site rules regarding homework assignment questions.

Thanks for joining <my appologies if this is not homework>.
Apr 1 '07 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

7
by: ojorus | last post by:
Hello! I want to make a login system as secure as possible on a website I develop. * The user shall log on using a Username and a password (which is stored in a mySQL database) *The server...
18
by: R. Rajesh Jeba Anbiah | last post by:
This is regarding secure login implementation in PHP. I'm trying to understand <http://mail.yahoo.com/> If I understand right, they're passing the md5 hash instead of the password itself. But, I...
4
by: Jegenye 2001 Bt | last post by:
Could someone please suggest a very lightweight solution for protecting directories on a web server? (membership system) The job is basically this: An administrator, after logging in via the...
2
by: Xah Lee | last post by:
Python Doc Problem Example: os.system Xah Lee, 2005-09 today i'm trying to use Python to call shell commands. e.g. in Perl something like output=qx(ls) in Python i quickly located the...
25
by: Mike MacSween | last post by:
Yes, I've downloaded and read the FAQ. And searched the archives. I'm just treading a little carefully here because of the caveats about locking myself out of the db forever. Some answers I could...
6
by: A.M-SG | last post by:
Hi, I have an aspx page at the web server that provides PDF documents for smart client applications. Here is the code in aspx page that defines content type: Response.ContentType =...
7
by: Arran Pearce | last post by:
Hi, How can i get my ASP Page or Web Service to run as the LocalSystem rather than a user? cheers
5
by: martin | last post by:
Hi, I have created a class that is totally seperate from my web application. However this class is used extensivly by the web application for stuff like data access. I wish to add a function to...
0
by: Kumar | last post by:
Hi all, I have the following code which uses WebClient.UploadValues myNameValueCollection.Add("Name", name) myNameValueCollection.Add("Age", age) .............. ............. Dim web As New...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.