▶ 3.7 Resources
Important Terms Introduced
capability
capability-based security
censorware
compact access rules
content control software
default permit
Deny by Default
directory path
drive-by download
execute right
exploit
file folder
file-sharing policy
global policy
hierarchical directory
information states
interpreter
isolation policy
macro
object
owner rights
permission flags
processing state
rights
root directory
sandbox
scripting language
security policy
seek right
shell script
software patch
state
state diagram
storage state
subject
system rights
tailored policy
transmission state
Trojan
window of vulnerability
world rights
zero-day exploit
Abbreviations Introduced
CRUD—create, read, update, delete access rights
MBR—Master ...
Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.