Podcast
Questions and Answers
What type of access control leaves a certain amount of control to the discretion of the owner of an object?
What type of access control leaves a certain amount of control to the discretion of the owner of an object?
Which operating systems use Discretionary Access Controls (DAC) to facilitate accounting and auditing functions?
Which operating systems use Discretionary Access Controls (DAC) to facilitate accounting and auditing functions?
What is the basis of the military policy of security?
What is the basis of the military policy of security?
What does the military model of information security define information security in terms of?
What does the military model of information security define information security in terms of?
Signup and view all the answers
What type of policy does a central authority determine what information is to be accessible and by whom?
What type of policy does a central authority determine what information is to be accessible and by whom?
Signup and view all the answers
Study Notes
Access Control Models
- Discretionary Access Control (DAC) leaves a certain amount of control to the discretion of the owner of an object.
Operating Systems and DAC
- Unix and Windows NT operating systems use Discretionary Access Controls (DAC) to facilitate accounting and auditing functions.
Military Policy of Security
- The basis of the military policy of security is the concept of confidentiality, integrity, and availability.
Military Model of Information Security
- The military model of information security defines information security in terms of confidentiality, integrity, and availability.
Mandatory Access Control (MAC)
- A central authority determines what information is to be accessible and by whom in a Mandatory Access Control (MAC) policy.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge of information assurance, operating systems, database security, application software, and steganography with this quiz based on Chapter 8 of CYB 322. Topics covered include IA problems and solutions related to various software components.