Chapter 1 course work: 1. What does ARPA stand for? Answer: 2. Which DoD report
ID: 3648685 • Letter: C
Question
Chapter 1 course work:1. What does ARPA stand for?
Answer:
2. Which DoD report attempted to define the multiple control mechanisms necessary for the protection of a multilevel computer system?
Answer:
3. True or False: MULTICS is a now obsolete operating system designed for security objectives.
Answer:
4. True or False: Personal security addresses the issues needed to protect items, objects, or areas.
Answer:
5. ____ security addresses the protection of individuals or groups authorized to access an organization.
a. Public
b. Personnel
c. Physical
d. Personal
Answer:
6. ____ security encompasses the protection of an organization's communications media, technology, and content.
Answer:
7. Ownership or control of information is called the characteristic of _____.
a. confidentiality
b. possession
c. authenticity
d. integrity
Answer:
8. True or False: If information has a state of being genuine or original and is not a fabrication, it has the characteristic of authenticity.
Answer:
9. The characteristic of information that deals with preventing disclosure is ______.
10. ConfidentialityTrue or False: Information security programs that begin at a grassroots level by system administrators to improve security are often called a bottom-up approach.
Answer:
11. When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow a(n) ____ approach.
a. executive led
b. trickle down
c. top-down
d. bottom-up
Answer:
12. A formal approach to solving a problem based on a structured sequence of procedures is called a(n) _____.
Answer:
13. Which SecSDLC phase keeps the security systems in a high state of readiness?
Answer:
14. A senior executive who promotes an information security project and ensures its support, both financially and administratively, at the highest levels of the organization is called a(n) _____.
Answer:
15. True or False: The person responsible for the storage, maintenance, and protection of the information is the data custodian.
Answer:
16. What are the three most commonly encountered communities of interest that have roles and responsibilities in information security?
Answer:
17. True or False: With the level of complexity in today
Explanation / Answer
1.Advanced Research Projects Agency (ARPA) 2.Multi-level secure database management system (MLS-DBMS) security requirements are defined in terms of the view of the database presented to users with different authorizations. These security requirements are intended to be consistent with DOD secure computing system requirements. An informal security policy for a multi-level secure database management system is outlined, and mechanisms are introduced that support the policy. Security constraints are the mechanism for defining classification rules, and query modification is the mechanism for implementing the classification policy. These mechanisms ensure that responses to users’ queries can be assigned classifi- cations which will make them observable to the querying users. A multi-level secure database management system (MLS-DBMS) is different from a conventional DBMS in at least three ways: (1) every data item in the database has associated with it one of several classifications or sensitivities, that may change dynamically; (2) control of users’ access to data must be based upon these classifications; and (3) the classification based access controls cannot be avoided or subverted, that is, they are mandatory. In such a multi-level secure database system, the critical factor which distinguishes one user from another is that each is authorized to access only particular sub-sets of the data within the DBMS. An MLS-DBMS addresses the rather natural expectation that users at different levels should be able to use the same database, with each seeing only that data for which s/he has appropriate authorization, and users with different authoriza- tions sharing some data. Although there have been several attempts at designing a general purpose MLS-DBMS [3,7], the problems encountered in designing and building such a system are quite difficult, and have not yet been overcome It is only recently and with considerable diffi- culty that the simpler case, that of providing multi-level security for operating systems and for their associated resources, has been solved. Such a multi-level computing system is generally referred to as a trusted computer base (TCB) within the computer security community. 3.true 4.true
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.