100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MSIS 4123 Exam 2 (Questions & Answers) Rated 100% Correct!! £6.35   Add to cart

Exam (elaborations)

MSIS 4123 Exam 2 (Questions & Answers) Rated 100% Correct!!

 15 views  0 purchase
  • Module
  • MSIS 4123
  • Institution
  • MSIS 4123

"Secure", as in secure programs - No single definition; never 100% secure "The Cloud" - "Someone Else's Computer" "Upstream Early and Often" - Popular open source motto regarding code changes Access Control List - Each object has a list of right per object or user; inverse of a file directory A...

[Show more]

Preview 3 out of 16  pages

  • July 18, 2024
  • 16
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • MSIS 4123
  • MSIS 4123
avatar-seller
MSIS 4123 Exam 2 "Secure", as in secure programs - No single definition; never 100% secure "The Cloud" - "Someone Else's Computer" "Upstream Early and Often" - Popular open source motto regarding code changes Access Control List - Each object has a list of right per object or user; inverse of a file directory Active fault detection - Prorgrams should watch for errors; redundant (duplicate) systems should take the place of failed systems if possible Apache License 2.0 - Can be applied to both copyrights and patents Appropriate Confidence Level in Trusted Software - Trust matches the sensitivity of the environment and the data ASCII - American Standard code for info interchange A standard for representing binary values as human -interpreted characters; a code sheet Assembly language - One step up from machine code; Uses words like "push" and "pop" and "add" Assurance (Trusted Systems) - Our belief that the O/S in implemented in a way that enforces the security policy Audit Logs - Track actions in computer; who did what, when Base Register - Variable fence register that sets the lower bound (lower memory location) Bell-LaPadula Model - Simple Security Property (no read up) * - Property (no write down) All about confidentiality Biba Model - Simple Integrity Rule (no read down) Integrity * -Property (no write up) All about the integrity of the data Biometrics - Authentication that relies on physical characteristics of user BIOS - The first set of instructions ran by a computer; stored in ROM Black Box Testing - Trying to break a program without looking at the code Bounds Register - Variable fence register that sets the upper memory location Brain Virus - Early prototype virus; boot sector virus Brute Force Attack - Trying every possible password combination BSD License - Fewer restrictions than GPL; New BSD restricts use of contributor names for endorsement of a derived work Buffer Overflow - Commiting more data to memory than has been allotted; this pushes data into other memory regions, can allow improper access Change Control - Senior group that reviews and decides on major software changes Chinese Wall Security Policy - Confidentiality; Working on X bars you from seeing Y; Law firm example Clark -Wilson Commercial Security Policy - Integrity and Confidentiality; well -formed transactions; separation of duty Clear Box Testing - Trying to break a program while having the advantage of also seeing the code. Code Red - Very bad virus; exploited IIS; used buffer overflow; different actions on different days Cohesion - We want high cohesion; all code in a module relates to that module Commerical Security Policies - No formal clearances; poor regulation of rules; internal data vs everything else Common Criteria - US/Canadian rewrite of the DoD Orange Book; 1992 Compiled code - All the code is turned into machine code at once; An .exe file is compiled code Complete Mediation - Every access attempt is checked Concurrency Managment - Concurrency management is ensuring that many people can change data at the same time but in some sane order Contributor (Open Source Software) - Someone who has made new code or code changes that are accepted into the original source code Counting in binary - Number right to left starting with 1 and doubling to 256. Add all the numbers over a "1" in binary

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICMATERIALS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £6.35. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85443 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£6.35
  • (0)
  Add to cart