ICS 355 Resource Security

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:04 AM on 2/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

22 Terms

1
New cards

What is a resource?

A resource is whatever we (humans, animals, organisms) compete for.

2
New cards

Is a resource easy to use but hard to come by

True

3
New cards

What is an asset?

a resource that can be secured

4
New cards

What do privately owned assets require?

authorization

5
New cards

What do publicly owned assets require?

availability

6
New cards

What makes a protection effective

If it is cost effective

7
New cards

How is static access control enforced

preventing accesses in access matrix that are not permitted in permission matrix

8
New cards

What is a permission matrix

All of the actions that a subject is permitted to execute on an object

9
New cards

What is an access matrix?

All of the actions the subject attempts to execute on an object

10
New cards

What do unix like OSes use for access controls?

ACLs (Access control lists)

11
New cards

What is an access control list (ACL)?

actions permitted on an object based on groups

12
New cards

What do androids use for access control?

capabilities list

13
New cards

what is a capabilities list?

Subject based permissions

14
New cards

What does a clearance structure consist of

  1. list of clearances

  2. list of subject locations

  3. list of object locations

15
New cards

What is the history of Multi level security

Security tokens → Money → Numeral Systems → alphabets

16
New cards

What does a security model consist of?

permission matrix, access matrix, clearance map, and location map

17
New cards

What are the four requirements for a state to be secure?

authorization, clearance, no read up, no write down

18
New cards

what is discretionary access control (DAC)?

where the authorizations can be delegated

19
New cards

what is mandatory access control (MAC)

where the authorizations are centrally managed

20
New cards

Are AC and MLS static models?

True

21
New cards

What is AC more convenient for? What is MLS more convenient for?

AC is convenient for local security. MLS is more convenient for distributed systems

22
New cards

What are the similarities between AC and MLS

They both allow declaring security requirements and do not allow validating when the requirements are satisfied

Explore top notes

note
PROTEINS
Updated 1159d ago
0.0(0)
note
Nursing 110 Final
Updated 1172d ago
0.0(0)
note
APES 5.3
Updated 417d ago
0.0(0)
note
Chapter 8: Legislative Branch
Updated 1047d ago
0.0(0)
note
AP Euro Timeline : Dates to Know
Updated 502d ago
0.0(0)
note
PROTEINS
Updated 1159d ago
0.0(0)
note
Nursing 110 Final
Updated 1172d ago
0.0(0)
note
APES 5.3
Updated 417d ago
0.0(0)
note
Chapter 8: Legislative Branch
Updated 1047d ago
0.0(0)
note
AP Euro Timeline : Dates to Know
Updated 502d ago
0.0(0)

Explore top flashcards

flashcards
Health Psychology Vocab
34
Updated 146d ago
0.0(0)
flashcards
Election statistics
37
Updated 1021d ago
0.0(0)
flashcards
Unit 9 and 10 vocabulary
128
Updated 1057d ago
0.0(0)
flashcards
Legal and Ethical Outline
49
Updated 417d ago
0.0(0)
flashcards
SS chapters 10 & 11 vocab
29
Updated 7d ago
0.0(0)
flashcards
Health Psychology Vocab
34
Updated 146d ago
0.0(0)
flashcards
Election statistics
37
Updated 1021d ago
0.0(0)
flashcards
Unit 9 and 10 vocabulary
128
Updated 1057d ago
0.0(0)
flashcards
Legal and Ethical Outline
49
Updated 417d ago
0.0(0)
flashcards
SS chapters 10 & 11 vocab
29
Updated 7d ago
0.0(0)