Podcast
Questions and Answers
Which type of access control is controlled by the object's owner or principals authorized by the owner?
Which type of access control is controlled by the object's owner or principals authorized by the owner?
What is the main difference between mandatory access control (MAC) policies and discretionary access control (DAC) policies?
What is the main difference between mandatory access control (MAC) policies and discretionary access control (DAC) policies?
Which type of access control policy codifies best practices that existed before computerization?
Which type of access control policy codifies best practices that existed before computerization?
Which communities were multi-level security policies initially developed for?
Which communities were multi-level security policies initially developed for?
Signup and view all the answers
Apart from confidentiality, what other aspect of information can multi-level security policies protect?
Apart from confidentiality, what other aspect of information can multi-level security policies protect?
Signup and view all the answers
Which type of access control policy is based on rules set by the institution rather than individuals?
Which type of access control policy is based on rules set by the institution rather than individuals?
Signup and view all the answers
Which communities were multi-level security policies initially developed for?
Which communities were multi-level security policies initially developed for?
Signup and view all the answers
What is the main purpose of multi-level security policies?
What is the main purpose of multi-level security policies?
Signup and view all the answers
Which type of access control policy supports a need-to-know principle for accessing confidential information?
Which type of access control policy supports a need-to-know principle for accessing confidential information?
Signup and view all the answers
Which type of access control policy codifies best practices that existed before computerization?
Which type of access control policy codifies best practices that existed before computerization?
Signup and view all the answers