Information Systems homework help

Answer the following questions

 

Question 1: Can a user cleared for <secret; {dog, cat, pig}> have access to documents classified in each of the following ways under the military security model? (6 points)

Yes/No

  1. <secret; {moose}>                           _________
  2. <confidential; {dog, cat, pig}>          _________
  3. <confidential; {moose}>                  __________________
  4. <top secret; dog>                            ________________
  5. <secret; {dog}>                                __________________
  6. <secret; {dog, cow}>                       __________________

Question 2: Alan and Beatrice are both users of PKI. Explain how they use their keys to communicate when Alan sends a private message to Beatrice, and provides proof that he sent the message. List your answer in steps:

 

 

Question 3 Compare and contrast Mandatory Access Control and Discretionary Access Control. How well are they supported in various well-known (common) operating systems?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now