IMT4213 System Security

This class was created by Brainscape user Lars Veggeland. Visit their profile to learn more about the creator.

Decks in this class (19)

Chapter 1 - An overview of computer security
0  cards
Chapter 2 - Access control matrix
What does the concepts of state a...,
What is a access control matrix,
What are the basic acm commands
4  cards
The safety problem
What is the safety definition use...,
What is right leakage,
Is right leakage always bad
4  cards
Take Grant Protection Model
What is the take grant model,
What are the main components of t...,
What are the rights in the take g...
8  cards
Confidentiality policies
What are the main components of a...,
What are the typical clearance le...,
What is the simple security condi...
5  cards
Bell-LaPadula Model
What does it mean for the bell la...,
What is the discretionary securit...,
What is the definition of a secur...
3  cards
Integrity policies
What are the five integrity model...,
What are the goals of lipner s fi...,
What is information transfer
8  cards
The Lipner Model (Integrity Matrix Policy)
What is the purpose of the lipner...,
What are the confidentiality cate...,
What are the integrity categories...
4  cards
Clark-Wilson Inrtegrity Model
What is the clark wilson,
What is meant by the consistency ...,
What are the main features of the...
7  cards
Chinese Wall Model
What is the main motivation behin...,
What factors are used to determin...,
How are objects structured in the...
6  cards
Role Based Access Control
What is the purpose of roles in rbac,
What is a session in rbac,
Why are rbac models the most used...
7  cards
Attribute Based Access Control
How are access decisions made in ...,
What are the advantages with abac,
What is the main downside with abac
3  cards
Access Control Reference Monitor
What is a reference monitor,
What are the three,
Where is the reference monitor si...
3  cards
eXtensible Access Control Markup Language (XACML)
What is xacml,
How are access decisions made in ...,
What is the policy set in xacml
7  cards
Assurance
What is the point of assurance te...,
Why do we need assurance,
What types of assurances are used...
8  cards
Evaluation
What is the purpose of evaluation...,
What does a formal evaluation met...,
What are typically the targets of...
5  cards
The Orange Book (TCSEC)
What is tcsec,
What are the functional requireme...,
What are the special operational ...
8  cards
ITSEC
What is itsec,
What does a security target st co...,
What are the requirements of itsec
5  cards
The Common Criteria (CC)
0  cards

More about
IMT4213 System Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Lars Veggeland's IMT4213 System Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Computer System Security Part 2
  • 5 decks
  • 34 flashcards
  • 22 learners
Decks: Mobile Security, Database Security, Administering Security And Security Eval, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Cardiovascular System
  • 41 decks
  • 3142 flashcards
  • 148 learners
Decks: Overview And Function Of The Cardiovascu, Electrical Activity Of The Heart, A First Look At The Ecg, And more!
Make Flashcards