File access control relates largely to the secrecy dimension of security. What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?
What will be an ideal response?
The matrix can control mode of access (e.g., read, write, delete), of whichwrite and delete have integrity dimensions. However, the control is very coarse: the ability to write is controlled, butwhat is written is not controlled.
You might also like to view...
A(n) ____________________ is a standard for sending and receiving data.
Fill in the blank(s) with the appropriate word(s).
There is no difference in a residential and a commercial lease.
Answer the following statement true (T) or false (F)
A(n) ____ integrates several layers of protection to detect and prevent malicious attacks.
A. WLAN concentrator B. AP concentrator C. wireless intrusion prevention system (WIPS) D. RF fingerprinter
A(n) ____ is a named storage location that can hold a value.
a. language b. input c. variable d. expression