?Matching: separation of duties - sensitivity levels - storage channel - task-based controls - timing channel - TCB - blueprint - DAC - content-dependent access controls - rule-based access controls

A. A framework or security model customized to an organization, including implementation details.
B. Controls implemented at the discretion or option of the data user.
C. Controls access to a specific set of information based on its content.
D. Access is granted based on a set of rules specified by the central authority.
E. Requires that significant tasks be split up in such a way that more than one individual is responsible for their completion.
F. Ratings of the security level for a specified collection of information (or user) within a mandatory access control scheme.
G. One of the TCSEC's covert channels, which communicate by modifying a stored object.
H. A form of non discretionary control where access is determined based on the tasks assigned to a specified user.
I. A TCSEC-defined covert channel, which transmits information by managing the relative timing of events.
J. Within TCSEC, the combination of all hardware, firmware, and software responsible for enforcing the security policy.

A. blueprint
B. DAC
C. content-dependent access controls
D. rule-based access controls
E. separation of duties
F. sensitivity levels
G. storage channel
H. task-based controls
I. timing channel
J. TCB

Computer Science & Information Technology

You might also like to view...

Therapy that involves the use of internet is called ______________.

A. internet counseling B. web counseling C. e-counseling D. on-line counseling

Computer Science & Information Technology

When sizing a picture in a cell, decrease the size of the cell or column to avoid unwanted distortion of the picture

Indicate whether the statement is true or false

Computer Science & Information Technology