Question: MATCH Access Control Matrix 1 Too much space, Access Control List 2 Efficient to store sparse matrix Trojan Horse 3 Potentially destructive program threat Logic
| MATCH
Access Control Matrix |
1 |
Too much space, |
| Access Control List | 2 | Efficient to store sparse matrix |
| Trojan Horse | 3 | Potentially destructive program threat |
| Logic bomb | 4 | Nondestructive program threat |
| Worm | 5 | Program threat disguised as useful software/data |
| Virus | 6 | Event activated Program threat |
| Protection Goal | 7 | All objects are accesses correctly |
| Least Privilege Principle | 8 | Just enough knowledge/access for the task at hand |
|
| 9 | Know all what may need at any time |
|
| 0 11 | Data is never shared None of the mentioned |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
