Course Hero Logo

Information-Systems-Security-Management-Professional-(ISSMP).pdf

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 9 pages.

ISSMPISC2Information Systems Security Management(R) Professional
of time. It does not cover ideas or facts. Copyright laws protect intellectual property frommisuse by other individuals.Answer option D is incorrect. A patent is a set of exclusive rights granted to anyone whoinvents any new and useful machine, process, composition of matter, etc. A patent enablesthe inventor to legally enforce his right to exclude others from using his invention.Reference:"http.//en.wikipedia.org/wiki/Trademark"QUESTION:216An organization monitors the hard disks of its employees' computers from time to time.Which policy does this pertain to?
QUESTION:217Sarah has created a site on which she publishes a copyrighted material. She is ignorant thatshe is infringing copyright. Is she guilty under copyright laws?
Explanation:152
Sarah is guilty under copyright laws because pleading ignorance of copyright infringementis not an excuse.What is copyright?
Reference:"http.//en.wikipedia.org/wiki/Copyright"QUESTION:218Which of the following models uses a directed graph to specify the rights that a subjectcan transfer to an object or that a subject can take from another subject?A. Take-Grant Protection ModelB. Bell-LaPadula ModelC. Biba Integrity ModelD. Access MatrixAnswer:AExplanation:The take-grant protection model is a formal model used in the field of computer security toestablish or disprove the safety of a given computer system that follows specific rules. Itshows that for specific systems the question of safety is decidable in linear time, which isin general undecidable. The model represents a system as directed graph, where verticesare either subjects or objects. The edges between them are labeled and the label indicatesthe rights that the source of the edge has over the destination. Two rights occur in everyinstance of the model. take and grant. They play a special role in the graph rewriting rulesdescribing admissible changes of the graph.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 9 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Mohammad Alizadeh
Tags
Configuration management

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture