Matching
Match each item with a statement below:
Premises:
describe the different approaches that can be used to attack a system
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
the process of discovering all necessary requirements
software attack that prohibits an opponent from using a program or an entire system
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
the most widely recognized MLS model
freedom from danger
allows a software program to run only with a matching external piece of information called a license
the standard for ranking product capabilities and trustworthiness
Responses:
Security
Confinement problem
TCSEC
Negative-use cases
Code protection
Licensing
Denial of Service (DoS)
Requirement analysis
Bell-LaPadula security model
Correct Answer:
Premises:
Responses:
describe the different approaches that can be used to attack a system
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
the process of discovering all necessary requirements
software attack that prohibits an opponent from using a program or an entire system
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
the most widely recognized MLS model
freedom from danger
allows a software program to run only with a matching external piece of information called a license
the standard for ranking product capabilities and trustworthiness
Premises:
describe the different approaches that can be used to attack a system
involves making changes to the software program that prevent malicious users from accessing the internal state of the software, thereby making copying very difficult
the process of discovering all necessary requirements
software attack that prohibits an opponent from using a program or an entire system
examines the problem of confining a software program during its execution so that it cannot transmit information to any other programs except its caller
the most widely recognized MLS model
freedom from danger
allows a software program to run only with a matching external piece of information called a license
the standard for ranking product capabilities and trustworthiness
Responses:
Related Questions
Q32: _ is a new programming paradigm that
Q33: Compare dynamic versus static analysis.
Q34: Briefly describe the main characteristics of the
Q35: AOP defines the concept of a(n) _
Q36: What are the three essential TCB elements
Q37: AOP introduces a new construct, called a(n)
Q38: _ is by far the most talked
Q39: The interrelationships among security levels in the
Q40: What are the evaluation levels defined by
Q42: What are the security aspects of AOP?
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents