{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Unit 4-1 Discretionary Access [Compatibility Mode]

Unit 4-1 Discretionary Access [Compatibility Mode] - 1 Unit...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 12/19/2010 1 Unit 4: Discretionary Access Unit 4: Discretionary Access Part 1 Click Here to Start Audio Discretionary Controls Discretionary Controls c “The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject.” ◦ “Guide to Understanding Discretionary Access Control” Discretionary Access Discretionary Access c If a person or process chooses to give access, they can: ◦ Transfer of Classified information w/o clearance ◦ Fundamental Flaw - Trojan Horses 12/19/2010 2 Least Privilege Least Privilege c Each subject should be granted the most restrictive set of privileges needed for the performance of authorized tasks - generalization of “need to know”. Authentication of Users Authentication of Users c Most basic form of security is identifying who has access to the computer....
View Full Document

{[ snackBarMessage ]}

Page1 / 6

Unit 4-1 Discretionary Access [Compatibility Mode] - 1 Unit...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online