chapter08 terms

chapter08 terms - need-to-know Programs Risk management...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Principles of Information Security 1-1 Chapter 7 Key Terms access control list (ACL) capabilities table dumpster diving lattice-based access control
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: need-to-know Programs Risk management role-based controls task-based controls threat identification U.S. military classification scheme...
View Full Document

This note was uploaded on 08/27/2010 for the course IS 2820 taught by Professor Jameskoshi during the Spring '10 term at Webber.

Ask a homework question - tutors are online