Explain what is security policy and what are the corresponding mechanisms in the case of a multi- user operating system such as UNIX.
What will be an ideal response?
Policy concerns the application of these mechanisms by a particular user or in a particular working environment. For example, the default access permissions on new files might be "rw-------" in the case of an environment in which security is a high priority, and "rw-r--r--" where sharing is encouraged.
You might also like to view...
A class member function that automatically initializes the data members of a class is called
a. the init function b. an operator c. a constructor d. a cast
When a program lets the user know that an invalid menu choice has been made, this is an example of
A) input validation. B) output validation. C) menu reselection. D) invalidation. E) being user unfriendly.
For each successful ping command, include the IP header data of an outgoing ICMP Echo Request message and an incoming ICMP Echo Reply message (with respect to the private network).
What will be an ideal response?
The rapid sequence of still images that produce the illusion of movement is known as ____________________.
Fill in the blank(s) with the appropriate word(s).