?Matching: separation of duties - sensitivity levels - storage channel - task-based controls - timing channel - TCB - blueprint - DAC - content-dependent access controls - rule-based access controls
A. A framework or security model customized to an organization, including implementation details.
B. Controls implemented at the discretion or option of the data user.
C. Controls access to a specific set of information based on its content.
D. Access is granted based on a set of rules specified by the central authority.
E. Requires that significant tasks be split up in such a way that more than one individual is responsible for their completion.
F. Ratings of the security level for a specified collection of information (or user) within a mandatory access control scheme.
G. One of the TCSEC's covert channels, which communicate by modifying a stored object.
H. A form of non discretionary control where access is determined based on the tasks assigned to a specified user.
I. A TCSEC-defined covert channel, which transmits information by managing the relative timing of events.
J. Within TCSEC, the combination of all hardware, firmware, and software responsible for enforcing the security policy.
A. blueprint
B. DAC
C. content-dependent access controls
D. rule-based access controls
E. separation of duties
F. sensitivity levels
G. storage channel
H. task-based controls
I. timing channel
J. TCB
You might also like to view...
A strong password contains at least ____ characters.
A. four B. five C. six D. seven
What property gives the value of the index of an item selected in a list box.
(A) election (B) eletedItem (C) Index (D) electedIndex
To select a range of cells for use as arguments in a function, click the upper-left cell and release the mouse button.
Answer the following statement true (T) or false (F)
A gigabyte is larger than a petabyte
Indicate whether the statement is true or false