Access Control Slide Set #4 Textbook Chapter 4 Clicker Questions

Slides:



Advertisements
Similar presentations
NRL Security Architecture: A Web Services-Based Solution
Advertisements

Operating System Security
Educational Research: Competencies for Analysis & Application:
Access Control Methodologies
Fall 2002CMSC Discrete Structures1 Permutations How many ways are there to pick a set of 3 people from a group of 6? There are 6 choices for the.
Access Control Intro, DAC and MAC System Security.
© 2004 Programmed Instruction ­Students work through this Unit of Learning at their own pace and are tested at each step with a multiple choice question.
Introduction to Databases
Object-Oriented Databases
Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 4: Access Control.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
2  A system can protect itself in two ways: It can limit who can access the system. This requires the system to implement a two-step process of identification.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
ACCESS CONTROL & INTRUSION DETECTION BY:RAUL FERNANDES
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Percent This slide needs the title “Percent”, your name, and two pictures that represent percent. Choose a nice background and apply it to all of your.
System Analysis and Design
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
The Call to Write, Third Edition
The Practice of Statistics Third Edition Chapter 8: The Binomial and Geometric Distributions 8.1 The Binomial Distribution Copyright © 2008 by W. H. Freeman.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.
Creative Commons Attribution Non-Commercial Share Alike License sa/3.0/
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
Creating a Quiz MOODLE. Creating a Quiz:- Click on turn editing on Then add an activity. Give the quiz a name and instructions for the students to follow.
Academic Year 2014 Spring Academic Year 2014 Spring.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
CHAPTER NINE Accessing Data Using XML. McGraw Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved Introduction The eXtensible.
Database Design, Application Development, and Administration, 6 th Edition Copyright © 2015 by Michael V. Mannino. All rights reserved. Chapter 5 Understanding.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
SECURITY Prepared By: Dr. Vipul Vekariya.. 2 S ECURITY Secure system will control, through use of specific futures, access to information that only properly.
Introduction to Databases Transparencies
Introduction to Databases Transparencies
GO! with Microsoft Office 2016
CSIS 115 Database Design and Applications for Business
Wine Expert System Created to select wine for a meal Simulated Expert
Introduction to Programming in MATLAB
Computer Data Security & Privacy
Introduction to Databases Transparencies
Introduction to Databases
GO! with Microsoft Access 2016
Introduction to Databases
Chapter 6: Community Features.
Presentation Test. Second Slide Third Slide It worked.
Advanced System Security
Assignment 4 For this assignment refer to the notes on MATLAB from an MIT course that you can find here (or at the original website, lectures 14, 15, 16).
Introduction to Databases
Topic 1: Operating Systems - User Interfaces
Advanced System Security
Data Modeling for Database Design 2
Instructions for Webinar Participation
Introduction to Databases
Introduction to Databases Transparencies
MACROS MUST BE ENABLED FOR THIS FILE TO WORK
Facilitator Instructions
Malicious Software Slide Set #5 Textbook Chapter 6 Clicker Questions
Software Security Slide Set #10 Textbook Chapter 11 Clicker Questions
Buffer Overflow Slide Set #7 Textbook Chapter 10 Clicker Questions
Multiple Choice Quiz.
Review Tasks CLU 3MR Lesson 6.
Penetration Testing & Network Defense
Network Penetration Testing & Defense
Penetration Testing & Network Defense
Advanced System Security
AUTHORIZATION AND ACCESS CONTROL DATA SECURITY identification Authentication Authorization.
Presentation transcript:

Access Control Slide Set #4 Textbook Chapter 4 Clicker Questions                     Peer Instruction Questions for Intro to Computer Security by William E. Johnson, Allison Luzader, Irfan Ahmed is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Discretionary access control Mandatory access control Consider and identify the following access control policy. Access is controlled based on comparing security labels indicating sensitivity of system resources with security clearances. An entity with access to a certain resource may not enable another entity to access that resource. Discretionary access control Mandatory access control Role based access control None/Other/More than one of the above Correct Answer = B Source: Computer Security Principles and Practice, Third Edition, page 152 Question Triggers: “Use ‘none of the above’”: due to the provided choice “Identify a set or subset” due to the possibility of multiple choices “Analysis and reasoning” due to the requirement of feature identification in the question for each form of access control “Qualitative questions” as this requires an understanding of each form of access control as well as the differences of each Total count: 4 Count without none of the above: 3 Count without identify a set: 3 Count without none of the above or identify a set: 2 Complexity: Simple, as this question is asking to identify a basic form of access control based on the description Presentation: Feature Identification

Discretionary access control Mandatory access control Consider and identify the following access control policy. Access is controlled based on the identity of the requestor and on access rules that state what requestors are allowed to do. An entity might be able to permit another entity to access a particular resource. Discretionary access control Mandatory access control Role based access control None/Other/More than one of the above Correct Answer = A Source: Computer Security Principles and Practice, Third Edition, page 152 Question Triggers: “Use ‘none of the above’”: due to the provided choice “Identify a set or subset” due to the possibility of multiple choices “Analysis and reasoning” due to the requirement of feature identification in the question for each form of access control “Qualitative questions” as this requires an understanding of each form of access control as well as the differences of each Total count: 4 Count without none of the above: 3 Count without identify a set: 3 Count without none of the above or identify a set: 2 Complexity: Simple, as this question is asking to identify a basic form of access control based on the description Presentation: Feature Identification

Discretionary access control Mandatory access control Consider and identify the following access control policy. Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles. Discretionary access control Mandatory access control Role based access control None/Other/More than one of the above Correct Answer = C Source: Computer Security Principles and Practice, Third Edition, page 152 Question Triggers: “Use ‘none of the above’”: due to the provided choice “Identify a set or subset” due to the possibility of multiple choices “Analysis and reasoning” due to the requirement of feature identification in the question for each form of access control “Qualitative questions” as this requires an understanding of each form of access control as well as the differences of each Total count: 4 Count without none of the above: 3 Count without identify a set: 3 Count without none of the above or identify a set: 2 Complexity: Simple, as this question is asking to identify a basic form of access control based on the description Presentation: Feature Identification