The number of failed logon attempts that trigger an account action is called an audit logon event.
Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different officers to enter their access codes before allowing the system to engage. Which principle of security is this following?
Common methods used to identify a user to a system include username, smart card, and biometrics.
An example of a threat to access control is in a peer-to-peer (P2P) arrangement in which users share their My Documents folder with each other by accident.
Content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.
Subjects cannot change objects that have a lower integrity level.
The number of failed logon attempts that trigger an account action is called an audit logon event.
Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different officers to enter their access codes before allowing the system to engage. Which principle of security is this following?
Common methods used to identify a user to a system include username, smart card, and biometrics.
An example of a threat to access control is in a peer-to-peer (P2P) arrangement in which users share their My Documents folder with each other by accident.
Content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.
Subjects cannot change objects that have a lower integrity level.