Unit 5-1 Multilevel Security [Compatibility Mode]

Unit 5-1 Multilevel Security [Compatibility Mode] -...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 12/19/2010 1 Unit 5: Mandatory Access Unit 5: Mandatory Access Control Control Part 1 Click Here To Start Audio Mandatory Security Mandatory Security c Based on some higher-level policy (e.g., multilevel security) c Establishes checks that cannot be circumvented by the user or a process acting on the users behalf. c Required at Levels B1 and above. c Commercially available in Unix and Linux Security Levels Security Levels c Security Levels are Partially Ordered c Hierarchical (E.g., Top Secret, Secret) c Non-Hierarchical (E.g., NOFORN, NATO) 12/19/2010 2 Clearance Clearance c Authorization to access information c Typically goes through a vetting process. c Established by a trusted third- party. Intended Use (NCSC Intended Use (NCSC-TG TG-010) 010) Can Be Expressed Can Be Expressed Mathematically Mathematically c Unclassified < Confidential < Secret < Top Secret c Guides Implementation c Allows Formal Verification 12/19/2010 3 Labeling Labeling c Information must be accurately labeled.accurately labeled....
View Full Document

This note was uploaded on 02/20/2011 for the course TECH 7375 taught by Professor June during the Spring '11 term at University of Arkansas for Medical Sciences.

Page1 / 6

Unit 5-1 Multilevel Security [Compatibility Mode] -...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online