Matching
Match each item with a statement below:
Premises:
describe the different approaches that can be used to attack a system
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
the process of discovering all necessary requirements
software attack that prohibits an opponent from using a program or an entire system
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
the most widely recognized MLS model
freedom from danger
allows a software program to run only with a matching external piece of information called a license
the standard for ranking product capabilities and trustworthiness
Responses:
Security
Confinement problem
TCSEC
Negative-use cases
Code protection
Licensing
Denial of Service (DoS)
Requirement analysis
Bell-LaPadula security model
Correct Answer:
Premises:
Responses:
describe the different approaches that can be used to attack a system
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
the process of discovering all necessary requirements
software attack that prohibits an opponent from using a program or an entire system
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
the most widely recognized MLS model
freedom from danger
allows a software program to run only with a matching external piece of information called a license
the standard for ranking product capabilities and trustworthiness
Premises:
describe the different approaches that can be used to attack a system
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
the process of discovering all necessary requirements
software attack that prohibits an opponent from using a program or an entire system
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
the most widely recognized MLS model
freedom from danger
allows a software program to run only with a matching external piece of information called a license
the standard for ranking product capabilities and trustworthiness
Responses:
Related Questions
Q12: Briefly describe the main characteristics of the
Q13: _ channels allow information to be transmitted
Q14: _ is by far the most talked
Q15: During _, unified security architecture must be
Q16: What are the two procedures that should
Q18: The MLS security model cannot be implemented
Q19: _ is a popular AOP language based
Q20: What are some issues that can be
Q21: _ takes a close look at each
Q22: What are the MLS general access rules?