CIRCUMSTANCES THAT HAS THE POTENTIAL TO CAUSE LOSS OR HARM.

Get a 10% discount on an order above
Use the following coupon code :
Get10

Order a Similar Paper Order a Different Paper
Short answer or Fill-In: (2 points each)
1. ________ is a set of circumstances that has the potential to
cause loss or harm.
2. ____________ is an access control mechanism that is based on
two sets of attributesone set of attributes associated with the
current domain of execution of a subject and the other set of
attributes is associated with an object.
3. The ________ model is a lattice-based formal model for
confidentiality, and it continues to be the dominant security
policy model even today.
4. The _________ model is an integrity policy model that is a
dual of the Bell-LaPadula model in that it inverts the dominance
relation.
5. A __________ computer system is a system that employs
sufficient hardware and software assurance techniques to allow it
to process information at multiple security levels.
6. Which security model is most useful for preventing the
contamination of data?
7. __________ is a protective measure that is an action, device,
procedure, or _________ that removes or minimizes risk or its
impact.
8. The fundamental security design principles include fail-safe
defaults, complete mediation, open design, isolation, _________,
__________, ___________, and _____________.
9. A(n) _________ is a weakness in an asset or group of assets
that can be exploited by one or more threats.
10. The _________________ security model is an information flow
model used to implement dynamically changing access
permissions.
Questions (5 points each)
11. Explain the Trusted Computing Base (TCB). What does it
maintain? What basic functions are monitored by the TCB?
12. What is information security? What is information assurance?
What is the difference between the two terms?
13. Explain the relationship between a threat, a risk, and a
countermeasure.
14. What is the function of the Reference Monitor?
15. What are the guiding principles of the Reference Validation
Mechanism?
16. Define and provide examples of the three core aspects of
information security.

Looking for a similar assignment? Get help from our qualified experts!

Our specialized Assignment Writers can help you with your custom paper today. 100% written from scratch

Order a Similar Paper Order a Different Paper