Match each item with a statement below:
A. freedom from danger
B. allows a software program to run only with a matching external piece of information called a license
C. involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
D. software attack that prohibits an opponent from using a program or an entire system
E. the most widely recognized MLS model
F. examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
G. the standard for ranking product capabilities and trustworthiness
H. the process of discovering all necessary requirements
I. describe the different approaches that can be used to attack a system
A. Security
B. Licensing
C. Code protection
D. Denial of Service (DoS)
E. Bell-LaPadula security model
F. Confinement problem
G. TCSEC
H. Requirement analysis
I. Negative-use cases
You might also like to view...
ACLs filter packets by using a __________ base to determine whether to allow a packet to pass.
Fill in the blank(s) with the appropriate word(s).
In the ____ column, a dot means that a given layer is visible.
a. Visibility b. Display c. Show d. Reveal
________ groups are collapsed in the accompanying figure.
A. All B. No C. Two D. Three
A(n) ________ network is one in which each computer can communicate directly with the others.
Fill in the blank(s) with the appropriate word(s).