Deck 2: Software Engineering and Security

Full screen (f)
exit full mode
Question
14)Before users are allowed to access any information in the MLS model, they assigned a ____ level.

A) lattice
B) classification
C) clearance
D) compartment
Use Space or
up arrow
down arrow
to flip the card.
Question
10)A "____" is a special type of "smart" virus that can replicate from system to system without human user intervention.

A) worm
B) Trojan horse
C) macros
D) logic bomb
Question
17)A ____ case is a specific way of using the system by performing some part of the functionality.

A) positive-use
B) negative-use
C) risk-use
D) designed-use
Question
16)The ____ model is the most fundamental process model used to build software.

A) XP
B) CLASP
C) AOP
D) waterfall
Question
2)The value of a DEUD is the same for every software product deployed.
Question
13)____ provides strict access control, allowing information to flow freely between users in a computing system who have appropriate security access while preventing information leaks to unauthorized users.

A) COTS
B) MLS
C) XP
D) CLASP
Question
3)Performance and piracy are not considerations when data and execution are sent remotely.
Question
6)____ is defined as the illegal copying and/or distributing of copyrighted software without the permission of the copyright holder.

A) Extreme programming
B) Software piracy
C) System protection
D) System leak
Question
1)A security requirement is a manifestation of a high-level security policy related to the detailed requirements of a specific system.
Question
18)During ____, unified security architecture must be put in place to enable the system to enforce various security principles and fulfill all the use cases from requirement analysis.

A) low-level design
B) high-level design
C) implementation
D) testing
Question
12)The term ____ describes products that are commercially available and can be purchased and integrated with little or no customization.

A) TCSEC
B) MLS
C) OTC
D) COTS
Question
8)____ breaks the software code into portions that run on ordinary RAM, portions that run on read-only memory (ROM), portions that run under secure hardware, and/or portions that run remotely in a trusted location.

A) Licensing
B) DEUD
C) Hidden licensing
D) Code partitioning
Question
20)The ____ model provides an implementation guide that helps project managers to decide if a particular activity needs to be adopted.

A) AOP
B) XP
C) waterfall
D) CLASP
Question
19)____ takes a close look at each software module and involves picking the appropriate programming languages, data structures, and algorithms.

A) Low-level design
B) Implementation
C) Testing
D) High-level design
Question
5)The MLS security model cannot be implemented on top of another base operating system.
Question
9)A ____ attaches itself to a program or data file so that it can spread from one computer to another, infecting as it travels.

A) Trojan
B) cookie
C) virus
D) worm
Question
11)A "____" is a type of stand-alone software attack that does not replicate by itself.

A) BIOS virus
B) worm
C) Trojan horse
D) virus
Question
7)With ____, the software is stored in such a way that a code is "hidden" before execution and an independently stored key is retrieved and constructed prior to execution using a method known only by the vendor.

A) code protection
B) licensing
C) DEUD protection
D) DEUD
Question
4)Security technologies such as firewalls, anti-virus software, and intrusion-detection engines have been developed to "catch" security holes in software systems.
Question
15)____ channels allow information to be transmitted by mechanisms not intended for signaling information, for example, locks, system load, or CPU cycle load.

A) Timing
B) Covert
C) Workload
D) Storage
Question
28)The _____ is specific information stored in the license that represents the uniqueness between a particular license and the environment where the software product is deployed.
Question
34)Why does security depend on more than technologies?
Question
29)_____ attack is the practice of conning people into revealing sensitive data about a computer system.
Question
25)In AOP, a(n) ____ is a rule indicating a logical description of a set of join points.

A) aspect
B) pointcut
C) advice
D) joint
Question
35)Why are security infrastructure mismatches one of the most serious issues in software security?
Question
39)What are the two procedures that should be completed before sign-off of the implementation phase of the waterfall model?
Question
33)What are some issues that can be prevented by software security?
Question
23)____ is a popular AOP language based on Java.

A) JBlue
B) JavaAOP
C) AspectJ
D) SmallTalk
Question
31)TCSEC defined _____ as the combination of the computer hardware, the software security kernel, and its privileged components.
Question
36)What are the MLS general access rules?
Question
27)In terms of software engineering, _____ is defined as the effort to create software in a secure computing platform.
Question
22)____ is a new programming paradigm that promotes separation of concerns.

A) AOP
B) XP
C) CLASP
D) Waterfall
Question
41)Compare dynamic versus static analysis.
Question
40)Briefly describe the main characteristics of the rational unified process (RUP)?
Question
26)AOP defines the concept of a(n) ____ as a well-defined point in the program flow.

A) pointcut
B) advice
C) join point
D) aspect
Question
What are the three essential TCB elements required to ensure that an MLS system operates correctly?
Question
24)AOP introduces a new construct, called a(n) ____, that seeks to encapsulate crosscutting concerns.

A) compartment
B) block
C) clearance
D) aspect
Question
21)____ is by far the most talked about and widely used agile methodology, at least among software consulting professionals.

A) Waterfall model
B) CLASP
C) Extreme programming (XP)
D) AOP
Question
30)The interrelationships among security levels in the Bell-LaPadula security model form a directed graph called a(n) _____.
Question
37)What are the evaluation levels defined by the TCSEC?
Question
Match between columns
describe the different approaches that can be used to attack a system
Denial of Service (DoS)
describe the different approaches that can be used to attack a system
Licensing
describe the different approaches that can be used to attack a system
Negative-use cases
describe the different approaches that can be used to attack a system
Confinement problem
describe the different approaches that can be used to attack a system
Requirement analysis
describe the different approaches that can be used to attack a system
Code protection
describe the different approaches that can be used to attack a system
Security
describe the different approaches that can be used to attack a system
Bell-LaPadula security model
describe the different approaches that can be used to attack a system
TCSEC
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Denial of Service (DoS)
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Licensing
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Negative-use cases
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Confinement problem
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Requirement analysis
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Code protection
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Security
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Bell-LaPadula security model
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
TCSEC
the process of discovering all necessary requirements
Denial of Service (DoS)
the process of discovering all necessary requirements
Licensing
the process of discovering all necessary requirements
Negative-use cases
the process of discovering all necessary requirements
Confinement problem
the process of discovering all necessary requirements
Requirement analysis
the process of discovering all necessary requirements
Code protection
the process of discovering all necessary requirements
Security
the process of discovering all necessary requirements
Bell-LaPadula security model
the process of discovering all necessary requirements
TCSEC
software attack that prohibits an opponent from using a program or an entire system
Denial of Service (DoS)
software attack that prohibits an opponent from using a program or an entire system
Licensing
software attack that prohibits an opponent from using a program or an entire system
Negative-use cases
software attack that prohibits an opponent from using a program or an entire system
Confinement problem
software attack that prohibits an opponent from using a program or an entire system
Requirement analysis
software attack that prohibits an opponent from using a program or an entire system
Code protection
software attack that prohibits an opponent from using a program or an entire system
Security
software attack that prohibits an opponent from using a program or an entire system
Bell-LaPadula security model
software attack that prohibits an opponent from using a program or an entire system
TCSEC
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Denial of Service (DoS)
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Licensing
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Negative-use cases
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Confinement problem
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Requirement analysis
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Code protection
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Security
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Bell-LaPadula security model
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
TCSEC
the most widely recognized MLS model
Denial of Service (DoS)
the most widely recognized MLS model
Licensing
the most widely recognized MLS model
Negative-use cases
the most widely recognized MLS model
Confinement problem
the most widely recognized MLS model
Requirement analysis
the most widely recognized MLS model
Code protection
the most widely recognized MLS model
Security
the most widely recognized MLS model
Bell-LaPadula security model
the most widely recognized MLS model
TCSEC
freedom from danger
Denial of Service (DoS)
freedom from danger
Licensing
freedom from danger
Negative-use cases
freedom from danger
Confinement problem
freedom from danger
Requirement analysis
freedom from danger
Code protection
freedom from danger
Security
freedom from danger
Bell-LaPadula security model
freedom from danger
TCSEC
allows a software program to run only with a matching external piece of information called a license
Denial of Service (DoS)
allows a software program to run only with a matching external piece of information called a license
Licensing
allows a software program to run only with a matching external piece of information called a license
Negative-use cases
allows a software program to run only with a matching external piece of information called a license
Confinement problem
allows a software program to run only with a matching external piece of information called a license
Requirement analysis
allows a software program to run only with a matching external piece of information called a license
Code protection
allows a software program to run only with a matching external piece of information called a license
Security
allows a software program to run only with a matching external piece of information called a license
Bell-LaPadula security model
allows a software program to run only with a matching external piece of information called a license
TCSEC
the standard for ranking product capabilities and trustworthiness
Denial of Service (DoS)
the standard for ranking product capabilities and trustworthiness
Licensing
the standard for ranking product capabilities and trustworthiness
Negative-use cases
the standard for ranking product capabilities and trustworthiness
Confinement problem
the standard for ranking product capabilities and trustworthiness
Requirement analysis
the standard for ranking product capabilities and trustworthiness
Code protection
the standard for ranking product capabilities and trustworthiness
Security
the standard for ranking product capabilities and trustworthiness
Bell-LaPadula security model
the standard for ranking product capabilities and trustworthiness
TCSEC
Question
42)What are the security aspects of AOP?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Software Engineering and Security
1
14)Before users are allowed to access any information in the MLS model, they assigned a ____ level.

A) lattice
B) classification
C) clearance
D) compartment
C
2
10)A "____" is a special type of "smart" virus that can replicate from system to system without human user intervention.

A) worm
B) Trojan horse
C) macros
D) logic bomb
A
3
17)A ____ case is a specific way of using the system by performing some part of the functionality.

A) positive-use
B) negative-use
C) risk-use
D) designed-use
A
4
16)The ____ model is the most fundamental process model used to build software.

A) XP
B) CLASP
C) AOP
D) waterfall
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
2)The value of a DEUD is the same for every software product deployed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
13)____ provides strict access control, allowing information to flow freely between users in a computing system who have appropriate security access while preventing information leaks to unauthorized users.

A) COTS
B) MLS
C) XP
D) CLASP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
3)Performance and piracy are not considerations when data and execution are sent remotely.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
6)____ is defined as the illegal copying and/or distributing of copyrighted software without the permission of the copyright holder.

A) Extreme programming
B) Software piracy
C) System protection
D) System leak
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
1)A security requirement is a manifestation of a high-level security policy related to the detailed requirements of a specific system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
18)During ____, unified security architecture must be put in place to enable the system to enforce various security principles and fulfill all the use cases from requirement analysis.

A) low-level design
B) high-level design
C) implementation
D) testing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
12)The term ____ describes products that are commercially available and can be purchased and integrated with little or no customization.

A) TCSEC
B) MLS
C) OTC
D) COTS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
8)____ breaks the software code into portions that run on ordinary RAM, portions that run on read-only memory (ROM), portions that run under secure hardware, and/or portions that run remotely in a trusted location.

A) Licensing
B) DEUD
C) Hidden licensing
D) Code partitioning
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
20)The ____ model provides an implementation guide that helps project managers to decide if a particular activity needs to be adopted.

A) AOP
B) XP
C) waterfall
D) CLASP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
19)____ takes a close look at each software module and involves picking the appropriate programming languages, data structures, and algorithms.

A) Low-level design
B) Implementation
C) Testing
D) High-level design
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
5)The MLS security model cannot be implemented on top of another base operating system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
9)A ____ attaches itself to a program or data file so that it can spread from one computer to another, infecting as it travels.

A) Trojan
B) cookie
C) virus
D) worm
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
11)A "____" is a type of stand-alone software attack that does not replicate by itself.

A) BIOS virus
B) worm
C) Trojan horse
D) virus
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
7)With ____, the software is stored in such a way that a code is "hidden" before execution and an independently stored key is retrieved and constructed prior to execution using a method known only by the vendor.

A) code protection
B) licensing
C) DEUD protection
D) DEUD
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
4)Security technologies such as firewalls, anti-virus software, and intrusion-detection engines have been developed to "catch" security holes in software systems.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
15)____ channels allow information to be transmitted by mechanisms not intended for signaling information, for example, locks, system load, or CPU cycle load.

A) Timing
B) Covert
C) Workload
D) Storage
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
28)The _____ is specific information stored in the license that represents the uniqueness between a particular license and the environment where the software product is deployed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
34)Why does security depend on more than technologies?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
29)_____ attack is the practice of conning people into revealing sensitive data about a computer system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
25)In AOP, a(n) ____ is a rule indicating a logical description of a set of join points.

A) aspect
B) pointcut
C) advice
D) joint
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
35)Why are security infrastructure mismatches one of the most serious issues in software security?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
39)What are the two procedures that should be completed before sign-off of the implementation phase of the waterfall model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
33)What are some issues that can be prevented by software security?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
23)____ is a popular AOP language based on Java.

A) JBlue
B) JavaAOP
C) AspectJ
D) SmallTalk
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
31)TCSEC defined _____ as the combination of the computer hardware, the software security kernel, and its privileged components.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
36)What are the MLS general access rules?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
27)In terms of software engineering, _____ is defined as the effort to create software in a secure computing platform.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
22)____ is a new programming paradigm that promotes separation of concerns.

A) AOP
B) XP
C) CLASP
D) Waterfall
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
41)Compare dynamic versus static analysis.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
40)Briefly describe the main characteristics of the rational unified process (RUP)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
26)AOP defines the concept of a(n) ____ as a well-defined point in the program flow.

A) pointcut
B) advice
C) join point
D) aspect
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
What are the three essential TCB elements required to ensure that an MLS system operates correctly?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
24)AOP introduces a new construct, called a(n) ____, that seeks to encapsulate crosscutting concerns.

A) compartment
B) block
C) clearance
D) aspect
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
21)____ is by far the most talked about and widely used agile methodology, at least among software consulting professionals.

A) Waterfall model
B) CLASP
C) Extreme programming (XP)
D) AOP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
30)The interrelationships among security levels in the Bell-LaPadula security model form a directed graph called a(n) _____.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
37)What are the evaluation levels defined by the TCSEC?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
describe the different approaches that can be used to attack a system
Denial of Service (DoS)
describe the different approaches that can be used to attack a system
Licensing
describe the different approaches that can be used to attack a system
Negative-use cases
describe the different approaches that can be used to attack a system
Confinement problem
describe the different approaches that can be used to attack a system
Requirement analysis
describe the different approaches that can be used to attack a system
Code protection
describe the different approaches that can be used to attack a system
Security
describe the different approaches that can be used to attack a system
Bell-LaPadula security model
describe the different approaches that can be used to attack a system
TCSEC
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Denial of Service (DoS)
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Licensing
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Negative-use cases
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Confinement problem
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Requirement analysis
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Code protection
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Security
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Bell-LaPadula security model
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
TCSEC
the process of discovering all necessary requirements
Denial of Service (DoS)
the process of discovering all necessary requirements
Licensing
the process of discovering all necessary requirements
Negative-use cases
the process of discovering all necessary requirements
Confinement problem
the process of discovering all necessary requirements
Requirement analysis
the process of discovering all necessary requirements
Code protection
the process of discovering all necessary requirements
Security
the process of discovering all necessary requirements
Bell-LaPadula security model
the process of discovering all necessary requirements
TCSEC
software attack that prohibits an opponent from using a program or an entire system
Denial of Service (DoS)
software attack that prohibits an opponent from using a program or an entire system
Licensing
software attack that prohibits an opponent from using a program or an entire system
Negative-use cases
software attack that prohibits an opponent from using a program or an entire system
Confinement problem
software attack that prohibits an opponent from using a program or an entire system
Requirement analysis
software attack that prohibits an opponent from using a program or an entire system
Code protection
software attack that prohibits an opponent from using a program or an entire system
Security
software attack that prohibits an opponent from using a program or an entire system
Bell-LaPadula security model
software attack that prohibits an opponent from using a program or an entire system
TCSEC
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Denial of Service (DoS)
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Licensing
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Negative-use cases
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Confinement problem
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Requirement analysis
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Code protection
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Security
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Bell-LaPadula security model
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
TCSEC
the most widely recognized MLS model
Denial of Service (DoS)
the most widely recognized MLS model
Licensing
the most widely recognized MLS model
Negative-use cases
the most widely recognized MLS model
Confinement problem
the most widely recognized MLS model
Requirement analysis
the most widely recognized MLS model
Code protection
the most widely recognized MLS model
Security
the most widely recognized MLS model
Bell-LaPadula security model
the most widely recognized MLS model
TCSEC
freedom from danger
Denial of Service (DoS)
freedom from danger
Licensing
freedom from danger
Negative-use cases
freedom from danger
Confinement problem
freedom from danger
Requirement analysis
freedom from danger
Code protection
freedom from danger
Security
freedom from danger
Bell-LaPadula security model
freedom from danger
TCSEC
allows a software program to run only with a matching external piece of information called a license
Denial of Service (DoS)
allows a software program to run only with a matching external piece of information called a license
Licensing
allows a software program to run only with a matching external piece of information called a license
Negative-use cases
allows a software program to run only with a matching external piece of information called a license
Confinement problem
allows a software program to run only with a matching external piece of information called a license
Requirement analysis
allows a software program to run only with a matching external piece of information called a license
Code protection
allows a software program to run only with a matching external piece of information called a license
Security
allows a software program to run only with a matching external piece of information called a license
Bell-LaPadula security model
allows a software program to run only with a matching external piece of information called a license
TCSEC
the standard for ranking product capabilities and trustworthiness
Denial of Service (DoS)
the standard for ranking product capabilities and trustworthiness
Licensing
the standard for ranking product capabilities and trustworthiness
Negative-use cases
the standard for ranking product capabilities and trustworthiness
Confinement problem
the standard for ranking product capabilities and trustworthiness
Requirement analysis
the standard for ranking product capabilities and trustworthiness
Code protection
the standard for ranking product capabilities and trustworthiness
Security
the standard for ranking product capabilities and trustworthiness
Bell-LaPadula security model
the standard for ranking product capabilities and trustworthiness
TCSEC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)What are the security aspects of AOP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.