Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Figure 4-1 A simple finite state machine .In this example ,the authorized states

ID: 3847550 • Letter: F

Question

Figure 4-1 A simple finite state machine .In this example ,the authorized states are s1 and s2.

Figure 4-1 A simple finite state machine .In this example ,the authorized states are s1 and s2.

In Figure 4-1 .suppose that edge t3 went from s1 to s4. Would the resulting system be secure

3- Security Policies Consider the finite-state machine in the figure. It consists of four states and five transitions. The security policy partitions the states into a set of authorized states AA (SI, S2) and a set of unauthorized states UA tS3, Sl. The system is considered insecure if it can enter an unauthorized state. As a security consultant, by looking at the security state of this system, can you tell whether it is in a secure or an insecure state? Why?

Explanation / Answer

We cannot conclude that the system is in secure state or not but at transitions t1,t2,t4 it is secured.

And t3 and t5 it is insecure.

I Mean t3 directly is insecure.

And if edge t3 moves from s1 to s4the system is definitely in an insecure state.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote