Question: Question 1. Explain information flow control. Define confidentiality and integrity in IFC. Explain different types of information flow. Describe non-interference. Describe covert channels and give
Question 1.
- Explain information flow control.
- Define confidentiality and integrity in IFC.
- Explain different types of information flow.
- Describe non-interference.
- Describe covert channels and give a few examples of them.
Question 2.
- Define the workflow between the different access control elements
- Explain Attribute-based Access Control (ABAC)
- Evaluate ABAC Policies
- Define access control management techniques.
Question 3.
- Assess the false positive and false negative for an authentication mechanism
- List the strengths and weaknesses of passwords
- Assess biometrics mechanisms.
- Discuss multi-factor and continuous authentication.
Question 4.
- Explain the different parts of the definition of privacy
- Explain the notion of k-anonymity
- Discuss about differential privacy
Question 5.
- Describe potential threats to a system.
- Identify threat loss scenarios.
- Describe different types of risk analysis.
- Use MITRE ATT&ACK for scope analysis.
- Use different databases to develop and analyse security threats.
- Describe different types of control functions.
- Use different databases to develop and analyse security control strategies
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
