answersLogoWhite

0


Best Answer

C2 level security provides for:

  1. Discretionary Access Control
  2. Identification and Authentication
  3. Auditing
  4. Resource reuse
User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the stipulations of C2 level security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Performing Arts

Where are flesh crawlers in runescape?

Flesh crawlers are medium level monsters found on level 2 of the Stronghold of Security. They are considered good training for players with combat levels of 35-60+.


Three cannibals and three missionaries must cross a river their boat can only hold two people at a time but each missionary and each cannibal can row the boat find a way to cross the river?

3 Missionaries: M1, M2, M3 3 Cannibals: C1, C2, C3 Start Shore A Other Shore B 1. C1, M1 take the boat and cross the river and C1 stays on shore B, M1 comes back to shore A. 2. C2, C3 take the boat and cross the river and C2 stays on shore B, C3 comes back to shore A ( C1, C2 on Shore B). 3. M1, M2 take the boat and cross the river and M1 stays on shore B, M2,C2 come back to shore A (M1, C1 on shore B). 4. M2, M3 take the boat and cross the river and M2, M3 stays on shore B, C1 comes back to shore A (M1, M2, M3 on shore B). 5. C1, C2 take the boat and cross the river and C1 gets off and C2 goes back to shore A and brings C3. All lived happily ever after.


What is the relationship between security attacks and security services and security mechanisms in network security?

Security attack--any action that compromises the security of information (In simple terms, attempted to cause damage)Security Mechanism-- It is a mechanism that is designed todetectpreventrecoverfrom security attackSecurity Service--makes use of one or more security mechanism


What is security procedure?

. Describe relevant organisational security procedures


What has the author Thomas R Peltier written?

Thomas R. Peltier has written: 'Policies & procedures for data security' -- subject(s): Electronic data processing departments, Security measures, Computer security 'Complete Guide to CISM Certification' 'Information security fundamentals' -- subject(s): Computer security, Data protection, Computer Technology, Nonfiction, OverDrive 'Information security risk analysis' -- subject(s): Computer networks, Security measures, Computer security, Risk assessment 'Information Security Fundamentals On-line Self-study Course'

Related questions

What level of security does window NT meets?

C2 level security.


What is the first level in the Orange Book that requires labeled security?

The first level in the Orange Book that requires labeled security is the C2 level. At the C2 level, systems must enforce a basic form of mandatory access control and provide assurances that security policies are enforced. This level is considered a moderate level of security.


What are security issues?

security code nokia 5130 c2


What security issues?

security code nokia 5130 c2


How do you reset the security code on a Nokia C2-03?

Check out the related link for advice on how to reset the security code on a Nokia C2-03.


What are the stipulations on alimony in gautier mississippi?

Your social security will not be affected because of your unemployment benefits, but if you start receiving social security, you may no longer be eligible for unemployment.


How to choose the right home security equipment?

For most homeowners, nothing is more important than the safety of their family.%C2%A0 Keeping a home properly secure will not only help keep a family safe, but will also prevent vandals and thieves from entering a home.%C2%A0 One great way to make a home safer would be to purchase some home security equipment.%C2%A0 Knowing how to select the right home security equipment to meet your needs will not only maximize your home security, but also save you some money. %C2%A0 The first step in selecting the right home security equipment is to consider what you need.%C2%A0 If you decide that you need a fully integrated security system, then you would be best to work with a home security company.%C2%A0 These companies will come to your home, set up your home security system, and train you how to use the system properly.%C2%A0 Depending on the level of security that you choose, you could select a home security equipment system which comes with 24-hour surveillance by the security company.%C2%A0 Another version of home security equipment will come with motion and home invasion sensors that will send a signal to the home security system when suspicious activity takes place in your home. %C2%A0 If you do not want to invest that much money into home security equipment, there are other ways that you can still properly secure your home.%C2%A0 Purchasing new sturdy doors with secure dead bolts would be one way to improve your home security.%C2%A0 Another option would be to install double paned windows.%C2%A0 Double pane windows are windows that have two levels of glass and a level of insulation between the panes.%C2%A0 These windows are shatter proof and would be nearly impossible for an intruder to get through.%C2%A0 While sturdy doors and double pane windows are secure, they are in high demand due to their environmentally friendly features.%C2%A0 This demand is sure to improve the value of your home. %C2%A0 Another cheap way to improve your home security equipment would be to put key pad entries on all of your doors.%C2%A0 These entry systems will only unlock a door is a person properly enters the required key code.%C2%A0


Can Commercial ISPs be used on Military Computers?

They could but aren't usually used -- Military Computers must meet at least a C2 strict level of security requirements -- most ISPs generally aren't required to meet *any* security requirements at all.


What is Categories of Security C1 C2 C3 C4?

privacy, authenticity, integrity, trust


How do you play sitsiritsit on record?

Here~ D2 D2 D2 B D2 C2 B A C2 C2 C2 A C2 B A G D2 D2 D2 G G A B C2 C2 C2 C2 D2 C2 B A G D2 D2 D2 B D2 D2 D2 B D2 D2 D2 E2 D2 D2 B C2 C2 C2 A C2 C2 C2 A C2 C2 C2 B2 C2 B A G


Inherited a house with stipulations are they legal?

Stipulations may be legal depending on what they are.


What does this mean C2-c3 patent central canal and neural foramen?

This typically indicates that there is no obvious compression or narrowing of the central canal or neural foramen at the C2-C3 level of the spine. "Patent" means that these spaces are open and unobstructed. It suggests there are no significant structural abnormalities in this area.