1a. In the context of core Access Control
Define the following:
i. The notion of User-Role assignment (UA relation) [5 Marks]
ii. Define Discretionary Access Control (DAC)
b. Briefly describe the processes of encryption and decryption in relation to cryptography.
c. Explain how public key cryptography may be used for identification.
2. a. Explain how access control lists are used to represent access control matrices. Describe the
environments in which they are widely used and their advantages and disadvantages.
b. What is the plaintext for the following ciphertext, which was encrypted using a Caesar
substitution cipher:
i. FRURQD SDQGHPLF DWWDFN
ii. XQLWHG ZH VWDQG WRJHWLHO
c. List the names of five security services desired in computer networks. For each service,
explain what the service means.
Comments
Leave a comment