Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.
Answer: inheritance
Learn More :
Computer Security
- Privacy is broken down into four major areas: anonymity, unlinkability, unobservability, and _________.
- The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13.
- A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution fees to the distributor accordingly.
- A(n) _________ may be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof.
- The three types of patents are: utility patents, design patents, and ________.
- The right to seek civil recourse against anyone infringing his or her property is granted to the ________.
- The invasion of the rights secured by patents, copyrights, and trademarks is ________.
- The U.S. legal system distinguishes three primary types of property: real property, personal property, and _________ property.
- The 2001 _________ is the first international treaty seeking to address Internet crimes by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations.
- The most essential element of recovery from physical security breaches is ____.
- A(n) ________ is a battery backup unit that can maintain power to processors, monitors, and other equipment and can also function as a surge protector, power noise filter, and an automatic shutdown device.
- Noise along a power supply line, motors, fans, heavy equipment, microwave relay antennas, and other computers are all sources of _________.
- Human-caused threats can be grouped into the following categories: unauthorized physical access, theft, _________ and misuse.
- ________ physical threats are more difficult to deal with than environmental and technical threats.
- An _______ condition occurs when the IS equipment receives less voltage than is required for normal operation.
- Power utility problems can be grouped into three categories: undervoltage, overvoltage, and ________.
- _______ threats encompass threats related to electrical power and electromagnetic emission.
- _________ threats encompass conditions in the environment that can damage or interrupt the service of information systems and the data they contain.
- Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats.
- _________ security, also called infrastructure security, protects the information systems that contain data and the people who use, operate, and maintain the systems.
- The _________ provides the most accurate evaluation of an organization's IT system's security risks.
- The _________ approach combines elements of the baseline, informal, and detailed risk analysis approaches.
- Not proceeding with the activity or system that creates the risk is _________.
- _________ is sharing responsibility for the risk with a third party.
- The level of risk the organization views as acceptable is the organization's __________.
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.