Unit 4-1 Discretionary Access [Compatibility Mode]

Unit 4-1 Discretionary Access [Compatibility Mode] -...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 12/19/2010 1 Unit 4: Discretionary Access Unit 4: Discretionary Access Part 1 Click Here to Start Audio Discretionary Controls Discretionary Controls c The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. Guide to Understanding Discretionary Access Control Discretionary Access Discretionary Access c If a person or process chooses to give access, they can: Transfer of Classified information w/o clearance Fundamental Flaw - Trojan Horses 12/19/2010 2 Least Privilege Least Privilege c Each subject should be granted the most restrictive set of privileges needed for the performance of authorized tasks - generalization of need to know. Authentication of Users Authentication of Users c Most basic form of security is identifying who has access to the computer....
View Full Document

This note was uploaded on 02/20/2011 for the course TECH 7375 taught by Professor June during the Spring '11 term at University of Arkansas for Medical Sciences.

Page1 / 6

Unit 4-1 Discretionary Access [Compatibility Mode] -...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online