Computer Science, asked by garimamadaan6945, 1 year ago

List the limitations on the amount of information leaked per second through a covert channel in a multiaccess computing system

Answers

Answered by PappuPanWala
2
dekhiye behen ji app bahut maal hai apke jaisa questions to mili nahi sakta
Answered by dharanikamadasl
0

Answer:

The limitations of a converted channel in a multiaccess computing system are covert channels are extremely difficult to implement in practical systems and are frequently found through system performance monitoring. Furthermore, they have a low signal-to-noise ratio and data speeds.

Explanation:

  • ISPL systems are designed to be free of hidden channels.
  • Only when people fail to follow established processes can multilevel security get compromised.
  • The automated portions of the system are unable to reveal data to a user who has not been granted access.
  • Attempting to overcome some of the restrictions of an ISPL system, on the other hand, may result in complex procedures, which pose a major risk of unintentional compromise becoming more common and malicious intrusion becoming easier to organise.
  • Because the subsystems are self-contained, none of the coordination between them can be automated.
  • This tends to negate all of the automation's potential benefits.
  • An ISPL system may be too cumbersome, imprecise, sluggish, or expensive for an application unless the required coordination among subsystems is small.
  • The only viable solution may then be an integrated multilevel system.
  • Unfortunately, many covert routes are common in multilevel systems.

Hence, the converting channels have their limitations.

#SPJ3

Similar questions