by Reashad Hossain | Dec 13, 2022 | Security
Due Diligence = Due DetectSteps you take to identify risks based on best practices and standards. Due Care = Due Correct.Action you take to bring the risk level down to an acceptable level and maintaining that level over time.
by Reashad Hossain | Dec 12, 2022 | Security
A security kernel is defined as the hardware, firmware, and software elements of a trusted computing base that implement the reference monitor concept A reference monitor is a system component that enforces access controls on an object
by Reashad Hossain | Dec 12, 2022 | Security
An access control matrix is a list of objects along with the permissions granted for each object. You can think of an access control matrix as a group of ACLs. Each ACL represents a single object and lists all the permissions for that object. A capability table is a...
by Reashad Hossain | Dec 11, 2022 | Security
A protection domain consists of the execution and memory space assigned to each process The use of protection rings is a scheme that supports multiple protection domains. Source: https://en.wikipedia.org/wiki/Protection_ring