This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 12/19/2010 1 Unit 4: Discretionary Access Unit 4: Discretionary Access Part 1 Click Here to Start Audio Discretionary Controls Discretionary Controls c “The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject.” ◦ “Guide to Understanding Discretionary Access Control” Discretionary Access Discretionary Access c If a person or process chooses to give access, they can: ◦ Transfer of Classified information w/o clearance ◦ Fundamental Flaw - Trojan Horses 12/19/2010 2 Least Privilege Least Privilege c Each subject should be granted the most restrictive set of privileges needed for the performance of authorized tasks - generalization of “need to know”. Authentication of Users Authentication of Users c Most basic form of security is identifying who has access to the computer....
View Full Document
- Spring '11
- Computer Security, Discretionary Access Control, Discretionary Access, Understanding Discretionary Access