Matching
Match each item with a statement below:
Premises:
process of connecting the peer trust anchors in a distributed trust model
provides a formal way of describing the security of systems based on various attacks
decentralizes the task of trust management to the users
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
standard solutions to common problems in software design
the most popular PKI trust model used today
sometimes referred as organizational survey assessment
uncertainty concerning the occurrence of a loss
speed up security analysis by providing tested and proven problem/solution pairs
Responses:
Attack tree
Trust model
Web trust model
Web of trust model
Risk
Attack patterns
Design patterns
Cross-certification
Qualitative assessment
Correct Answer:
Premises:
Responses:
process of connecting the peer trust anchors in a distributed trust model
provides a formal way of describing the security of systems based on various attacks
decentralizes the task of trust management to the users
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
standard solutions to common problems in software design
the most popular PKI trust model used today
sometimes referred as organizational survey assessment
uncertainty concerning the occurrence of a loss
speed up security analysis by providing tested and proven problem/solution pairs
Premises:
process of connecting the peer trust anchors in a distributed trust model
provides a formal way of describing the security of systems based on various attacks
decentralizes the task of trust management to the users
defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust
standard solutions to common problems in software design
the most popular PKI trust model used today
sometimes referred as organizational survey assessment
uncertainty concerning the occurrence of a loss
speed up security analysis by providing tested and proven problem/solution pairs
Responses:
Related Questions
Q9: _ is a security vulnerability when malicious
Q10: The _ trust model is a general
Q11: What are the steps involved in a
Q12: _ is the best implementation of the
Q13: Trust by itself can be measured quantitatively.
Q15: _ is a threat-rating system developed by
Q16: The digital certificate used by PGP is
Q17: _ is a security vulnerability at the
Q18: What are some of the characteristics of
Q19: _ risk is one that affects only