Computer Science, asked by shyamp24, 11 months ago

Statement 1: Access policy control refers to Violation of SoD Constraint and Cyclic Inheritance
Control
Statement 2:Modification security attack is an attack on Confidentiality
(a) Statement l is True and Statement 2 is False
(b) Statement 1 is False and Statement 2 is True
(C) Both are True
(d) Both are False

Answers

Answered by spriyanka2244
2

Answer a statement 1 is true and statement 2 is false

Explanation:

Answered by gratefuljarette
0

Answer:

Statement l is True and Statement 2 is False

Explanation:

  • The policy constraint is a super set of SOD in the sense that it refers to other constraints that policy must follow. For example a policy may have constraint that a particular role can not have more than 2 users and the access control system should be able to ensure that such rule is considered during role assignment. These policy constraint can be at the following levels User i.e. two person can not belong.
  • Separation of Duty(SOD)/ Mutually exclusive roles / Policy Constraints[NIST & TISSEC] This is a very important idea especially in current environment where compliance, conflict of interest and chinese walls are the buzz words. The basic idea with regards to SOD is that some of the actions on the object .

Learn more about Modification security attack

Which of the following security attack affects or exhibits threats to the integrity of any message?

(a) Interruption

(b) Modification

(c) Interception

(d) Fabrication

https://brainly.in/question/2927432

What event caused the establishment of the United States Department of Homeland Security? attack on the World Trade Center in 1993 bombing of the US embassy in Kenya in 1998 attack on US naval vessel USS Cole in 2000 attacks on the United States on September 11, 2001

https://brainly.com/question/9552367

Similar questions