The number of failed logon attempts that trigger an account action is called an audit logon event.
Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different officers to enter their access codes before allowing the system to engage. Which principle of security is this following?
Common methods used to identify a user to a system include username, smart card, and biometrics.
An example of a threat to access control is in a peer-to-peer (P2P) arrangement in which users share their My Documents folder with each other by accident.
Content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.
Subjects cannot change objects that have a lower integrity level.