This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 12/19/2010 1 Unit 4: Discretionary Access Unit 4: Discretionary Access Part 1 Click Here to Start Audio Discretionary Controls Discretionary Controls c The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. Guide to Understanding Discretionary Access Control Discretionary Access Discretionary Access c If a person or process chooses to give access, they can: Transfer of Classified information w/o clearance Fundamental Flaw - Trojan Horses 12/19/2010 2 Least Privilege Least Privilege c Each subject should be granted the most restrictive set of privileges needed for the performance of authorized tasks - generalization of need to know. Authentication of Users Authentication of Users c Most basic form of security is identifying who has access to the computer....
View Full Document
This note was uploaded on 02/20/2011 for the course TECH 7375 taught by Professor June during the Spring '11 term at University of Arkansas for Medical Sciences.
- Spring '11