1. The CIA triad describes the basic security properties we want systems to implement. Describe each of the three properties giving an example of how an operating system might implement the property. 2. What are the no-read up and no-write down rules in the context of multi- level security and how do they protect a system's security?
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!