File access control relates largely to the secrecy dimension of security. What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?
What will be an ideal response?
The
matrix
can
control
mode
of
access
(e.g.,
read,
write,
delete),
of
which
write
and
delete
have
integrity
dimensions.
However,
the
control
is
very
coarse:
the
ability
to
write
is
controlled,
but
what
is
written
is
not
controlled.
You might also like to view...
ToUpper(string) is
a) a way of converting a string to all upper cases. b) a way to make the first letter of every word in a string a capital letter. c) a way of making one string more important than the rest. d) a syntax error.
In a switch statement, when a break statement is encountered, an immediate transfer of control is made to
a) the default case of the switch statement b) a goto statement c) the else clause d) the statement beyond the end of the switch statement. e) none of these
What are some privacy policy guidelines are essential to ecommerce?
What will be an ideal response?
Which function will calculate the current value on an investment that will earn 5% interest on yearly payments of $100 over 10 years?
A) PV B) FV C) PMT D) NPV