why are detection techniques just as important as prevention techniques
cant rely on one, need to know what to do when something happens
What does an information systems security policy specify
what needs to be secured
Can the AES symetric cryptosystem be used to preform message authentication
yes
In asymetrical key system, can the private key be used for message signing
yes
what is the process of expressing access control policies in a computer sys called
authorization
What are subjects that violate MAC rules on purpose called
trusted subjects
What is a users permissions determined by in RBAC
their role in the organization