Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer Security & Forensics-Access control, Study Guides, Projects, Research of Computer Security

The document is a problem sheet for the course "Computer Security and Forensics," focusing on security fundamentals and access control. It includes exercises to deepen understanding of the CIA triad (Confidentiality, Integrity, Availability), threat analysis, and access control models like Role-Based Access Control (RBAC) and Discretionary Access Control (DAC). The exercises cover topics such as set theory, multi-level security, and POSIX file systems, with practical examples like payment card security and university access policies. The problem sheet serves as a study aid, with exercises similar to those in exams and MOLE quizzes, and includes references to further reading. The content is technical, aimed at students in computer security, and emphasizes practical application of theoretical concepts.

Typology: Study Guides, Projects, Research

2024/2025

Available from 03/13/2025

charles-khama
charles-khama 🇮🇹

1.3

(3)

2.9K documents

1 / 8

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
pf3
pf4
pf5
pf8

Partial preview of the text

Download Computer Security & Forensics-Access control and more Study Guides, Projects, Research Computer Security in PDF only on Docsity!

3/13/25, 10:00 PM 01-problemsheet-accesscontrol DO COMx501: Computer Security and Forensics Problem Sheet 1 Security Fundamentals & Access Control . 5 Academic year: Semester 2, 2018/19 fe Logica/Macking 4}... Discussion date: February 7, 2019 Abstract In this problem sheet, we will, first, deepen our knowledge of the core principle of information security: confidentiality, integrity, and availability. Second, we will deepen our knowledge of access control models and related concepts such as au- thentication and authorization. General Remarks ‘The purpose of problem sheets is to help you get to grips with the course materials. You do not have to hand them in and they will not be marked. The material may, however, be covered in the exam, and the lectures will assume that you have completed these problem sheets, Overall, these problem sheets serve three purposes: 1. help you to extend and deepen your knowledge of the subject as well as to apply what you leamed to concrete problems. 2. the exercises in the problem sheets are similar to the exercises that you might be asked in the exams and MOLE quizzes. In other words: the collection of problem sheets serves is worth multiple mock exams. 3. the are lecture notes that include detailed references to further readings, provide additional material for catching up on preliminaries that you might not remember ‘that well anymore, and, last but not least, repeat the most important material from the lecture, Type of Exercises The problem sheets contain several types of exercises: + Exercises are marked “(COM[346]501)": Exercises carrying this label discuss material that may be part of the MOLE quizzes and the exam for the modules COM3501, COM4501, and COM6501. + Exereises are marked “(COM[46]501)": Exercises carrying this label discuss material that may be part of the MOLE quizzes ‘and the exam for the modules COM4501 and COM6S01. + Exercises are marked “(Repetition)”: Exercises carrying this label discuss material that should you already know (ie, it should have been covered in modules that you took in your earlier undergraduate studies). Note that these exercises cover material that you might need to know to understand material discuss at a later stage of the lecture. Usually, the repetition exercises will be in an section of its own. (© 2019 Logicaltacking.com Student (COMxS01 ~ 2018/19 Page 1 of 8 about:blank