How do i detect malware on my mac4/28/2023 Given the number of system components outside your control (cpu, motherboard, network card, OS, and other software) even an expert would have difficulty achieving a high integrity assurance of a system without outside help. At the extreme you need a specialized processor which provides strict physical separation of data and control (Harvard architecture as opposed to von Neumann architecture). no one may use your system without your approval) you would need to expend an almost infinite amount of resources.Īt the very least you would need an operating system with much stricter partitioning and then OS X. To achieve complete assurance that your system has perfect integrity (i.e. The trade off is assurance of integrity against resources expended.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |