subject

1. Show that the three security services-confidentiality, integrity, and availabilty- are sufficient to deal with the threats of disclosure, disruption, deception, and usurpation.

2. A respected computer scientist has said that no computer can ever be made perfectly secure. Why might she have said this?

3. Consider a computer system with three users: Alice, Bob, Candy. Alice owns the file alicerc, and Bob and Cyndy can read it. Cyndy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cyndy can read and write the cile cyndyrc, which she owns. Assume that the owner of each of these files can execute it.

a. Create the corresponding access control matrix.

b. Cyndy gives Alice permission to read cyndyrc, and Alice removes Bob's ability to read alicerc. Show the new access control matrix.

4. A noted computer security expert has said that without integrity, no system can provide confidentiality.

a. Do you agree? Justify your answer

5. Classify each of the following as an example of a mandatory, discretionary, or originator controlled policy, or a combination thereof. Justify your answers.

a. The file access control mechanisms of the UNIX operating system.

b. A system in which no memorandum can be distributed without the author's consent.

c. A military facility in which only generals can enter a particular room.

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 08:30, Bradgarner772
Based on your knowledge of a good network, describe what you think is a perfect network would be. what kind of information and resources could users share on this network. what would the network administrator do? what kind of communication would be used?
Answers: 1
image
Computers and Technology, 24.06.2019 22:00, kingkush85
Difference between ancient and modern mode of information transmission
Answers: 1
image
Computers and Technology, 25.06.2019 00:30, marziel24
Which type of cell references are locked and not automatically updated when it’s copied a)formula b)relative c)absolute d)worksheet
Answers: 1
image
Computers and Technology, 25.06.2019 08:00, lizzyhearts
Which of the following statements is true of an intranet? it is a network where a computer is connected to the internet and acts as a gateway for other devices. it is a widely available public network of interconnected computer networks. it is a network that covers a wide area with the of rented telecommunication lines. it is a network within an organization that uses internet protocols and technologies.
Answers: 3
You know the right answer?
1. Show that the three security services-confidentiality, integrity, and availabilty- are sufficient...

Questions in other subjects:

Konu
Mathematics, 07.05.2020 01:15
Konu
English, 07.05.2020 01:15
Konu
Social Studies, 07.05.2020 01:16