Deck 2: Software Engineering and Security

ملء الشاشة (f)
exit full mode
سؤال
14)Before users are allowed to access any information in the MLS model, they assigned a ____ level.

A) lattice
B) classification
C) clearance
D) compartment
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
10)A "____" is a special type of "smart" virus that can replicate from system to system without human user intervention.

A) worm
B) Trojan horse
C) macros
D) logic bomb
سؤال
17)A ____ case is a specific way of using the system by performing some part of the functionality.

A) positive-use
B) negative-use
C) risk-use
D) designed-use
سؤال
16)The ____ model is the most fundamental process model used to build software.

A) XP
B) CLASP
C) AOP
D) waterfall
سؤال
2)The value of a DEUD is the same for every software product deployed.
سؤال
13)____ provides strict access control, allowing information to flow freely between users in a computing system who have appropriate security access while preventing information leaks to unauthorized users.

A) COTS
B) MLS
C) XP
D) CLASP
سؤال
3)Performance and piracy are not considerations when data and execution are sent remotely.
سؤال
6)____ is defined as the illegal copying and/or distributing of copyrighted software without the permission of the copyright holder.

A) Extreme programming
B) Software piracy
C) System protection
D) System leak
سؤال
1)A security requirement is a manifestation of a high-level security policy related to the detailed requirements of a specific system.
سؤال
18)During ____, unified security architecture must be put in place to enable the system to enforce various security principles and fulfill all the use cases from requirement analysis.

A) low-level design
B) high-level design
C) implementation
D) testing
سؤال
12)The term ____ describes products that are commercially available and can be purchased and integrated with little or no customization.

A) TCSEC
B) MLS
C) OTC
D) COTS
سؤال
8)____ breaks the software code into portions that run on ordinary RAM, portions that run on read-only memory (ROM), portions that run under secure hardware, and/or portions that run remotely in a trusted location.

A) Licensing
B) DEUD
C) Hidden licensing
D) Code partitioning
سؤال
20)The ____ model provides an implementation guide that helps project managers to decide if a particular activity needs to be adopted.

A) AOP
B) XP
C) waterfall
D) CLASP
سؤال
19)____ takes a close look at each software module and involves picking the appropriate programming languages, data structures, and algorithms.

A) Low-level design
B) Implementation
C) Testing
D) High-level design
سؤال
5)The MLS security model cannot be implemented on top of another base operating system.
سؤال
9)A ____ attaches itself to a program or data file so that it can spread from one computer to another, infecting as it travels.

A) Trojan
B) cookie
C) virus
D) worm
سؤال
11)A "____" is a type of stand-alone software attack that does not replicate by itself.

A) BIOS virus
B) worm
C) Trojan horse
D) virus
سؤال
7)With ____, the software is stored in such a way that a code is "hidden" before execution and an independently stored key is retrieved and constructed prior to execution using a method known only by the vendor.

A) code protection
B) licensing
C) DEUD protection
D) DEUD
سؤال
4)Security technologies such as firewalls, anti-virus software, and intrusion-detection engines have been developed to "catch" security holes in software systems.
سؤال
15)____ channels allow information to be transmitted by mechanisms not intended for signaling information, for example, locks, system load, or CPU cycle load.

A) Timing
B) Covert
C) Workload
D) Storage
سؤال
28)The _____ is specific information stored in the license that represents the uniqueness between a particular license and the environment where the software product is deployed.
سؤال
34)Why does security depend on more than technologies?
سؤال
29)_____ attack is the practice of conning people into revealing sensitive data about a computer system.
سؤال
25)In AOP, a(n) ____ is a rule indicating a logical description of a set of join points.

A) aspect
B) pointcut
C) advice
D) joint
سؤال
35)Why are security infrastructure mismatches one of the most serious issues in software security?
سؤال
39)What are the two procedures that should be completed before sign-off of the implementation phase of the waterfall model?
سؤال
33)What are some issues that can be prevented by software security?
سؤال
23)____ is a popular AOP language based on Java.

A) JBlue
B) JavaAOP
C) AspectJ
D) SmallTalk
سؤال
31)TCSEC defined _____ as the combination of the computer hardware, the software security kernel, and its privileged components.
سؤال
36)What are the MLS general access rules?
سؤال
27)In terms of software engineering, _____ is defined as the effort to create software in a secure computing platform.
سؤال
22)____ is a new programming paradigm that promotes separation of concerns.

A) AOP
B) XP
C) CLASP
D) Waterfall
سؤال
41)Compare dynamic versus static analysis.
سؤال
40)Briefly describe the main characteristics of the rational unified process (RUP)?
سؤال
26)AOP defines the concept of a(n) ____ as a well-defined point in the program flow.

A) pointcut
B) advice
C) join point
D) aspect
سؤال
What are the three essential TCB elements required to ensure that an MLS system operates correctly?
سؤال
24)AOP introduces a new construct, called a(n) ____, that seeks to encapsulate crosscutting concerns.

A) compartment
B) block
C) clearance
D) aspect
سؤال
21)____ is by far the most talked about and widely used agile methodology, at least among software consulting professionals.

A) Waterfall model
B) CLASP
C) Extreme programming (XP)
D) AOP
سؤال
30)The interrelationships among security levels in the Bell-LaPadula security model form a directed graph called a(n) _____.
سؤال
37)What are the evaluation levels defined by the TCSEC?
سؤال
Match between columns
describe the different approaches that can be used to attack a system
Denial of Service (DoS)
describe the different approaches that can be used to attack a system
Licensing
describe the different approaches that can be used to attack a system
Negative-use cases
describe the different approaches that can be used to attack a system
Confinement problem
describe the different approaches that can be used to attack a system
Requirement analysis
describe the different approaches that can be used to attack a system
Code protection
describe the different approaches that can be used to attack a system
Security
describe the different approaches that can be used to attack a system
Bell-LaPadula security model
describe the different approaches that can be used to attack a system
TCSEC
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Denial of Service (DoS)
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Licensing
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Negative-use cases
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Confinement problem
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Requirement analysis
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Code protection
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Security
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Bell-LaPadula security model
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
TCSEC
the process of discovering all necessary requirements
Denial of Service (DoS)
the process of discovering all necessary requirements
Licensing
the process of discovering all necessary requirements
Negative-use cases
the process of discovering all necessary requirements
Confinement problem
the process of discovering all necessary requirements
Requirement analysis
the process of discovering all necessary requirements
Code protection
the process of discovering all necessary requirements
Security
the process of discovering all necessary requirements
Bell-LaPadula security model
the process of discovering all necessary requirements
TCSEC
software attack that prohibits an opponent from using a program or an entire system
Denial of Service (DoS)
software attack that prohibits an opponent from using a program or an entire system
Licensing
software attack that prohibits an opponent from using a program or an entire system
Negative-use cases
software attack that prohibits an opponent from using a program or an entire system
Confinement problem
software attack that prohibits an opponent from using a program or an entire system
Requirement analysis
software attack that prohibits an opponent from using a program or an entire system
Code protection
software attack that prohibits an opponent from using a program or an entire system
Security
software attack that prohibits an opponent from using a program or an entire system
Bell-LaPadula security model
software attack that prohibits an opponent from using a program or an entire system
TCSEC
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Denial of Service (DoS)
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Licensing
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Negative-use cases
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Confinement problem
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Requirement analysis
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Code protection
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Security
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Bell-LaPadula security model
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
TCSEC
the most widely recognized MLS model
Denial of Service (DoS)
the most widely recognized MLS model
Licensing
the most widely recognized MLS model
Negative-use cases
the most widely recognized MLS model
Confinement problem
the most widely recognized MLS model
Requirement analysis
the most widely recognized MLS model
Code protection
the most widely recognized MLS model
Security
the most widely recognized MLS model
Bell-LaPadula security model
the most widely recognized MLS model
TCSEC
freedom from danger
Denial of Service (DoS)
freedom from danger
Licensing
freedom from danger
Negative-use cases
freedom from danger
Confinement problem
freedom from danger
Requirement analysis
freedom from danger
Code protection
freedom from danger
Security
freedom from danger
Bell-LaPadula security model
freedom from danger
TCSEC
allows a software program to run only with a matching external piece of information called a license
Denial of Service (DoS)
allows a software program to run only with a matching external piece of information called a license
Licensing
allows a software program to run only with a matching external piece of information called a license
Negative-use cases
allows a software program to run only with a matching external piece of information called a license
Confinement problem
allows a software program to run only with a matching external piece of information called a license
Requirement analysis
allows a software program to run only with a matching external piece of information called a license
Code protection
allows a software program to run only with a matching external piece of information called a license
Security
allows a software program to run only with a matching external piece of information called a license
Bell-LaPadula security model
allows a software program to run only with a matching external piece of information called a license
TCSEC
the standard for ranking product capabilities and trustworthiness
Denial of Service (DoS)
the standard for ranking product capabilities and trustworthiness
Licensing
the standard for ranking product capabilities and trustworthiness
Negative-use cases
the standard for ranking product capabilities and trustworthiness
Confinement problem
the standard for ranking product capabilities and trustworthiness
Requirement analysis
the standard for ranking product capabilities and trustworthiness
Code protection
the standard for ranking product capabilities and trustworthiness
Security
the standard for ranking product capabilities and trustworthiness
Bell-LaPadula security model
the standard for ranking product capabilities and trustworthiness
TCSEC
سؤال
42)What are the security aspects of AOP?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Software Engineering and Security
1
14)Before users are allowed to access any information in the MLS model, they assigned a ____ level.

A) lattice
B) classification
C) clearance
D) compartment
C
2
10)A "____" is a special type of "smart" virus that can replicate from system to system without human user intervention.

A) worm
B) Trojan horse
C) macros
D) logic bomb
A
3
17)A ____ case is a specific way of using the system by performing some part of the functionality.

A) positive-use
B) negative-use
C) risk-use
D) designed-use
A
4
16)The ____ model is the most fundamental process model used to build software.

A) XP
B) CLASP
C) AOP
D) waterfall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
2)The value of a DEUD is the same for every software product deployed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
13)____ provides strict access control, allowing information to flow freely between users in a computing system who have appropriate security access while preventing information leaks to unauthorized users.

A) COTS
B) MLS
C) XP
D) CLASP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
3)Performance and piracy are not considerations when data and execution are sent remotely.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
6)____ is defined as the illegal copying and/or distributing of copyrighted software without the permission of the copyright holder.

A) Extreme programming
B) Software piracy
C) System protection
D) System leak
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
1)A security requirement is a manifestation of a high-level security policy related to the detailed requirements of a specific system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
18)During ____, unified security architecture must be put in place to enable the system to enforce various security principles and fulfill all the use cases from requirement analysis.

A) low-level design
B) high-level design
C) implementation
D) testing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
12)The term ____ describes products that are commercially available and can be purchased and integrated with little or no customization.

A) TCSEC
B) MLS
C) OTC
D) COTS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
8)____ breaks the software code into portions that run on ordinary RAM, portions that run on read-only memory (ROM), portions that run under secure hardware, and/or portions that run remotely in a trusted location.

A) Licensing
B) DEUD
C) Hidden licensing
D) Code partitioning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
20)The ____ model provides an implementation guide that helps project managers to decide if a particular activity needs to be adopted.

A) AOP
B) XP
C) waterfall
D) CLASP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
19)____ takes a close look at each software module and involves picking the appropriate programming languages, data structures, and algorithms.

A) Low-level design
B) Implementation
C) Testing
D) High-level design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
5)The MLS security model cannot be implemented on top of another base operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
9)A ____ attaches itself to a program or data file so that it can spread from one computer to another, infecting as it travels.

A) Trojan
B) cookie
C) virus
D) worm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
11)A "____" is a type of stand-alone software attack that does not replicate by itself.

A) BIOS virus
B) worm
C) Trojan horse
D) virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
7)With ____, the software is stored in such a way that a code is "hidden" before execution and an independently stored key is retrieved and constructed prior to execution using a method known only by the vendor.

A) code protection
B) licensing
C) DEUD protection
D) DEUD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
4)Security technologies such as firewalls, anti-virus software, and intrusion-detection engines have been developed to "catch" security holes in software systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
15)____ channels allow information to be transmitted by mechanisms not intended for signaling information, for example, locks, system load, or CPU cycle load.

A) Timing
B) Covert
C) Workload
D) Storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
28)The _____ is specific information stored in the license that represents the uniqueness between a particular license and the environment where the software product is deployed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
34)Why does security depend on more than technologies?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
29)_____ attack is the practice of conning people into revealing sensitive data about a computer system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
25)In AOP, a(n) ____ is a rule indicating a logical description of a set of join points.

A) aspect
B) pointcut
C) advice
D) joint
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
35)Why are security infrastructure mismatches one of the most serious issues in software security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
39)What are the two procedures that should be completed before sign-off of the implementation phase of the waterfall model?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
33)What are some issues that can be prevented by software security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
23)____ is a popular AOP language based on Java.

A) JBlue
B) JavaAOP
C) AspectJ
D) SmallTalk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
31)TCSEC defined _____ as the combination of the computer hardware, the software security kernel, and its privileged components.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
36)What are the MLS general access rules?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
27)In terms of software engineering, _____ is defined as the effort to create software in a secure computing platform.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
22)____ is a new programming paradigm that promotes separation of concerns.

A) AOP
B) XP
C) CLASP
D) Waterfall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
41)Compare dynamic versus static analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
40)Briefly describe the main characteristics of the rational unified process (RUP)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
26)AOP defines the concept of a(n) ____ as a well-defined point in the program flow.

A) pointcut
B) advice
C) join point
D) aspect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
What are the three essential TCB elements required to ensure that an MLS system operates correctly?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
24)AOP introduces a new construct, called a(n) ____, that seeks to encapsulate crosscutting concerns.

A) compartment
B) block
C) clearance
D) aspect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
21)____ is by far the most talked about and widely used agile methodology, at least among software consulting professionals.

A) Waterfall model
B) CLASP
C) Extreme programming (XP)
D) AOP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
30)The interrelationships among security levels in the Bell-LaPadula security model form a directed graph called a(n) _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
37)What are the evaluation levels defined by the TCSEC?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
describe the different approaches that can be used to attack a system
Denial of Service (DoS)
describe the different approaches that can be used to attack a system
Licensing
describe the different approaches that can be used to attack a system
Negative-use cases
describe the different approaches that can be used to attack a system
Confinement problem
describe the different approaches that can be used to attack a system
Requirement analysis
describe the different approaches that can be used to attack a system
Code protection
describe the different approaches that can be used to attack a system
Security
describe the different approaches that can be used to attack a system
Bell-LaPadula security model
describe the different approaches that can be used to attack a system
TCSEC
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Denial of Service (DoS)
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Licensing
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Negative-use cases
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Confinement problem
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Requirement analysis
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Code protection
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Security
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
Bell-LaPadula security model
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
TCSEC
the process of discovering all necessary requirements
Denial of Service (DoS)
the process of discovering all necessary requirements
Licensing
the process of discovering all necessary requirements
Negative-use cases
the process of discovering all necessary requirements
Confinement problem
the process of discovering all necessary requirements
Requirement analysis
the process of discovering all necessary requirements
Code protection
the process of discovering all necessary requirements
Security
the process of discovering all necessary requirements
Bell-LaPadula security model
the process of discovering all necessary requirements
TCSEC
software attack that prohibits an opponent from using a program or an entire system
Denial of Service (DoS)
software attack that prohibits an opponent from using a program or an entire system
Licensing
software attack that prohibits an opponent from using a program or an entire system
Negative-use cases
software attack that prohibits an opponent from using a program or an entire system
Confinement problem
software attack that prohibits an opponent from using a program or an entire system
Requirement analysis
software attack that prohibits an opponent from using a program or an entire system
Code protection
software attack that prohibits an opponent from using a program or an entire system
Security
software attack that prohibits an opponent from using a program or an entire system
Bell-LaPadula security model
software attack that prohibits an opponent from using a program or an entire system
TCSEC
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Denial of Service (DoS)
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Licensing
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Negative-use cases
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Confinement problem
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Requirement analysis
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Code protection
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Security
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
Bell-LaPadula security model
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
TCSEC
the most widely recognized MLS model
Denial of Service (DoS)
the most widely recognized MLS model
Licensing
the most widely recognized MLS model
Negative-use cases
the most widely recognized MLS model
Confinement problem
the most widely recognized MLS model
Requirement analysis
the most widely recognized MLS model
Code protection
the most widely recognized MLS model
Security
the most widely recognized MLS model
Bell-LaPadula security model
the most widely recognized MLS model
TCSEC
freedom from danger
Denial of Service (DoS)
freedom from danger
Licensing
freedom from danger
Negative-use cases
freedom from danger
Confinement problem
freedom from danger
Requirement analysis
freedom from danger
Code protection
freedom from danger
Security
freedom from danger
Bell-LaPadula security model
freedom from danger
TCSEC
allows a software program to run only with a matching external piece of information called a license
Denial of Service (DoS)
allows a software program to run only with a matching external piece of information called a license
Licensing
allows a software program to run only with a matching external piece of information called a license
Negative-use cases
allows a software program to run only with a matching external piece of information called a license
Confinement problem
allows a software program to run only with a matching external piece of information called a license
Requirement analysis
allows a software program to run only with a matching external piece of information called a license
Code protection
allows a software program to run only with a matching external piece of information called a license
Security
allows a software program to run only with a matching external piece of information called a license
Bell-LaPadula security model
allows a software program to run only with a matching external piece of information called a license
TCSEC
the standard for ranking product capabilities and trustworthiness
Denial of Service (DoS)
the standard for ranking product capabilities and trustworthiness
Licensing
the standard for ranking product capabilities and trustworthiness
Negative-use cases
the standard for ranking product capabilities and trustworthiness
Confinement problem
the standard for ranking product capabilities and trustworthiness
Requirement analysis
the standard for ranking product capabilities and trustworthiness
Code protection
the standard for ranking product capabilities and trustworthiness
Security
the standard for ranking product capabilities and trustworthiness
Bell-LaPadula security model
the standard for ranking product capabilities and trustworthiness
TCSEC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
42)What are the security aspects of AOP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.