Match each item with a statement below:
A. defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
B. process of connecting the peer trust anchors in a distributed trust model
C. the most popular PKI trust model used today
D. decentralizes the task of trust management to the users
E. uncertainty concerning the occurrence of a loss
F. sometimes referred as organizational survey assessment
G. provides a formal way of describing the security of systems based on various attacks
H. standard solutions to common problems in software design
I. speed up security analysis by providing tested and proven problem/solution pairs
A. Trust model
B. Cross-certification
C. Web trust model
D. Web of trust model
E. Risk
F. Qualitative assessment
G. Attack tree
H. Design patterns
I. Attack patterns
You might also like to view...
__________ is a mechanism or service used to verify the integrity of a message.
A. Message authentication B. Data compression C. Data mapping D. Message digest
The general form for applying a qualified name to a two-sided tag is
A. global B. local C. parent D. child
In Impress, thumbnails of the slides can be viewed in Slide Sorter view
Indicate whether the statement is true or false
Initializing an array with a number of elements ____ the array's size is not allowed in any programming language.
A. fewer than B. more than C. greater than or equal to D. less than or equal to