Question: Question 1. Explain information flow control. Define confidentiality and integrity in IFC. Explain different types of information flow. Describe non-interference. Describe covert channels and give

Question 1.

  • Explain information flow control.
  • Define confidentiality and integrity in IFC.
  • Explain different types of information flow.
  • Describe non-interference.
  • Describe covert channels and give a few examples of them.

Question 2.

  • Define the workflow between the different access control elements
  • Explain Attribute-based Access Control (ABAC)
  • Evaluate ABAC Policies
  • Define access control management techniques.

Question 3.

  • Assess the false positive and false negative for an authentication mechanism
  • List the strengths and weaknesses of passwords
  • Assess biometrics mechanisms.
  • Discuss multi-factor and continuous authentication.

Question 4.

  • Explain the different parts of the definition of privacy
  • Explain the notion of k-anonymity
  • Discuss about differential privacy

Question 5.

  • Describe potential threats to a system.
  • Identify threat loss scenarios.
  • Describe different types of risk analysis.
  • Use MITRE ATT&ACK for scope analysis.
  • Use different databases to develop and analyse security threats.
  • Describe different types of control functions.
  • Use different databases to develop and analyse security control strategies

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!