File access control relates largely to the secrecy dimension of security. What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?
What will be an ideal response?
The matrix can control mode of access (e.g., read, write, delete), of whichwrite and delete have integrity dimensions. However, the control is very coarse: the ability to write is controlled, butwhat is written is not controlled.
Computer Science & Information Technology
You might also like to view...
Even legitimate organizations sometimes use email spam for promoting products.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
____ specifies that all collisions should be detected from anywhere in a network in less time than is required to place a 64-byte frame on the network.
A. Latency B. Transmission time C. Slot time D. Bit time
Computer Science & Information Technology