What is the imaginary boundary that separates components that maintain security from components that are not security related?
The Orange Book states that the trusted computing base should uniquely identifyeach user for accountability purposes and __________.
Which of the following are the best benefits of a network based database modelcompared to rest of the database models available in the industry?