In: Computer Science
•   What is “umask” in Unix?
•   What are the “setuid”, “setgid” and “sticky” bit
flags?
•   What are access tokens and security descriptors in
the context of Windows access control?
•   What are principles of the Bell-LaPadula
confidentiality model?
•   What are principles of the Biba integrity
model?
•   What are principles of the Clark-Wilson integrity
model?