Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Question 1. Explain information flow control. Define confidentiality and integrity in IFC. Explain different types of information flow. Describe non-interference. Describe covert channels and give
Question 1.
- Explain information flow control.
- Define confidentiality and integrity in IFC.
- Explain different types of information flow.
- Describe non-interference.
- Describe covert channels and give a few examples of them.
Question 2.
- Define the workflow between the different access control elements
- Explain Attribute-based Access Control (ABAC)
- Evaluate ABAC Policies
- Define access control management techniques.
Question 3.
- Assess the false positive and false negative for an authentication mechanism
- List the strengths and weaknesses of passwords
- Assess biometrics mechanisms.
- Discuss multi-factor and continuous authentication.
Question 4.
- Explain the different parts of the definition of privacy
- Explain the notion of k-anonymity
- Discuss about differential privacy
Question 5.
- Describe potential threats to a system.
- Identify threat loss scenarios.
- Describe different types of risk analysis.
- Use MITRE ATT&ACK for scope analysis.
- Use different databases to develop and analyse security threats.
- Describe different types of control functions.
- Use different databases to develop and analyse security control strategies
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started