1. Explain the features of trusted OS.
2. Compare and contrast the Bell–LaPadula model and the Biba integrity model.
3. What are the things to be taken care of while designing a trusted OS?
1. Point out the features of an intrusion detection system.
2. Write down the pros and cons of statistical anomaly-, signature- and stack-based IDS.
3. What are the different categories of IDS based on the location of observation of intrusion?