SECURITY IN COMPUTING: AUTHENTICATION, ACCESS CONTROL, AND CRYPTOGRAPHY

Security In Computing: AUTHENTICATION, ACCESS CONTROL, AND CRYPTOGRAPHY

exercise at the end of the Chapter 2 (3,6,15,16,20 & 22). These exercises require short essay type answers that assess your understanding of the material. Please refrain from providing long research paper type answers.

Question 3- File access control relates largely to the secrecy dimension of security.

What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?

Answer preview:

The access control matrix refers to controllable subject actions which may modification, reading, creating, deleting, copying, executing, destroying, or importing (Pfleeger, Pfleeger & Marguiles, 2015).

Objects are said to have integrity when they have flexible structures which allow users to utilize files in these many different ways.

An access control matrix maintains the integrity of objects through the use of efficient and robust techniques to keep unauthorized users from having unauthorized access to them while allowing authorized subjects to be able to access different

Words: 1286