File access control relates largely to the secrecy dimension of security. What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?

What will be an ideal response?


The matrix can control mode of access (e.g., read, write, delete), of whichwrite and delete have integrity dimensions. However, the control is very coarse: the ability to write is controlled, butwhat is written is not controlled.

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ is a standard for sending and receiving data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

There is no difference in a residential and a commercial lease.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ integrates several layers of protection to detect and prevent malicious attacks.

A. WLAN concentrator B. AP concentrator C. wireless intrusion prevention system (WIPS) D. RF fingerprinter

Computer Science & Information Technology

A(n) ____ is a named storage location that can hold a value.

a. language b. input c. variable d. expression

Computer Science & Information Technology