Computer Security: Principles and Practice Questions & Answers
1 view 0 purchase
Course
Computer Security: Principles and Practice,
Institution
Computer Security: Principles And Practice,
Computer Security: Principles and Practice,
T - Answer- Access control is the central element of computer security.
T - Answer- An auditing function monitors and keeps a record of user accesses to system resources.
T - Answer- The principal objectives of computer security are to prevent
...
an auditing function monitors and keeps a record o
a user may belong to multiple groups
Written for
Computer Security: Principles and Practice,
Computer Security: Principles and Practice,
Computer Security: Principles and Practice,
All documents for this subject (6)
Seller
Follow
Gurustudy
Reviews received
Content preview
Computer Security: Principles and
Practice,
T - Answer- Access control is the central element of computer security.
T - Answer- An auditing function monitors and keeps a record of user accesses to
system resources.
T - Answer- The principal objectives of computer security are to prevent
unauthorized users from gaining access to resources, to prevent legitimate users
from accessing resources in an unauthorized manner, and to enable legitimate users
to access resources in an authorized manner.
T - Answer- A user may belong to multiple groups.
T - Answer- An access right describes the way in which a subject may access an
object.
F - Answer- Traditional RBAC systems define the access rights of individual users
and groups of users.
Access control - Answer- 1. __________ implements a security policy that specifies
who or what may have access to each specific system resource and the type of
access that is permitted in each instance.
Authentication - Answer- __________ is verification that the credentials of a user or
other system entity are valid.
Authorization - Answer- _________ is the granting of a right or permission to a
system entity to access a system resource.
DAC - Answer- __________ is the traditional method of implementing access
control.
MAC - Answer- __________ controls access based on comparing security labels
with security clearances.
mandatory access control - Answer- A concept that evolved out of requirements for
military information security is ______ .
subject - Answer- A __________ is an entity capable of accessing objects.
object - Answer- A(n) __________ is a resource to which access is controlled.
RBAC - Answer- __________ is based on the roles the users assume in a system
rather than the user's identity.
, role - Answer- A __________ is a named job function within the organization that
controls this computer system
Constraints - Answer- __________ provide a means of adapting RBAC to the
specifics of administrative and security policies in an organization.
Cardinality - Answer- __________ refers to setting a maximum number with respect
to roles.
ABAC - Answer- Subject attributes, object attributes and environment attributes are
the three types of attributes in the __________ model.
access management - Answer- The __________ component deals with the
management and control of the
ways entities are granted access to resources.
Object - Answer- The basic elements of access control are: subject, __________,
and access right.
Environment - Answer- The three types of attributes in the ABAC model are subject
attributes, object attributes, and _________ attributes.
T - Answer- User authentication is the fundamental building block and the primary
line of defense.
F - Answer- Identification is the means of establishing the validity of a claimed
identity provided by a user.
T - Answer- Many users choose a password that is too short or too easy to guess.
T - Answer- User authentication is the basis for most types of access control and for
user accountability.
F - Answer- Memory cards store and process data.
T - Answer- Enrollment creates an association between a user and the user's
biometric characteristics.
T - Answer- In a biometric scheme some physical characteristic of the individual is
mapped into a digital representation.
password cracker - Answer- A __________ is a password guessing program.
reactive password checking - Answer- A __________ strategy is one in which the
system periodically runs its own password cracker to find guessable passwords.
facial characteristics - Answer- The most common means of human-to-human
identification are __________.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Gurustudy. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.35. You're not tied to anything after your purchase.