Pease answer the following questions Please give a brief exp

Pease answer the following questions. Please give a brief explanation of each answer:

A(n) attack involves an adversary repeating a previously captured user response. Question options: client replay Trojan horse The Bell-LaPadula Model is associated with Question options: mandatory access control, discretionary access control, role-based access control. When an organization adopts cloud storage or computing Question options: the threat of compromise increases, others becomes responsible for security, the location of data is unknown.

Solution

Qsn 3

Answer is 2) replay

Beacuse Trojan horse is a device used for the purpose of capturing a user password,passcode or biometric and

Clienys are adversary attempts to acheive user authentication without access to the remote host or the intervening communication path.

Qsn 4

Answer is 1)Mandatory Access Control 2)Discretionary Access Control

Beacuse Bell-Lapadula method defines two mandatory access control rules and one discretionary access control rules.

This method is a model of state machine ued for accessing controls to government and military applications which use security on objects and clearances of subjects.

Mandatory access control accesses controls by which the operating system contrains the ability of subject.

Disretionary access control is defined as the means of restriction of access to objects based on subjects.

Qsn 5

3)the location of data is unknown

Beacuse the cloud storage technology is designed in such a way that no others can access user\'s data.It gives storage managers new flexibility to deploy common tools and application and the data can be easily moved optimising cost etc..

Pease answer the following questions. Please give a brief explanation of each answer: A(n) attack involves an adversary repeating a previously captured user res

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site