In: Computer Science
• What is “umask” in Unix?
• What are the “setuid”, “setgid” and “sticky” bit
flags?
• What are access tokens and security descriptors in
the context of Windows access control?
• What are principles of the Bell-LaPadula
confidentiality model?
• What are principles of the Biba integrity
model?
• What are principles of the Clark-Wilson integrity
model?