Statement 1: Access policy control refers to Violation of SoD Constraint and Cyclic Inheritance
Control
Statement 2:Modification security attack is an attack on Confidentiality
(a) Statement l is True and Statement 2 is False
(b) Statement 1 is False and Statement 2 is True
(C) Both are True
(d) Both are False
Answers
Answered by
2
Answer a statement 1 is true and statement 2 is false
Explanation:
Answered by
0
Answer:
Statement l is True and Statement 2 is False
Explanation:
- The policy constraint is a super set of SOD in the sense that it refers to other constraints that policy must follow. For example a policy may have constraint that a particular role can not have more than 2 users and the access control system should be able to ensure that such rule is considered during role assignment. These policy constraint can be at the following levels User i.e. two person can not belong.
- Separation of Duty(SOD)/ Mutually exclusive roles / Policy Constraints[NIST & TISSEC] This is a very important idea especially in current environment where compliance, conflict of interest and chinese walls are the buzz words. The basic idea with regards to SOD is that some of the actions on the object .
Learn more about Modification security attack
Which of the following security attack affects or exhibits threats to the integrity of any message?
(a) Interruption
(b) Modification
(c) Interception
(d) Fabrication
https://brainly.in/question/2927432
What event caused the establishment of the United States Department of Homeland Security? attack on the World Trade Center in 1993 bombing of the US embassy in Kenya in 1998 attack on US naval vessel USS Cole in 2000 attacks on the United States on September 11, 2001
https://brainly.com/question/9552367
Similar questions