unit_4_p2_tech_7350_c5 - TECH 7350 Managing Information...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 4 Chapter 5 Unit 4 Chapter 5 Part 2 Part 2 Security Models Security Models 2 Protection Rings Provide: Strict boundaries and definitions for the processes that work within each ring Processes within the inner rings have more privileges than the processes operating in the outer rings Applications (e-mail, word processor, databases, web browser) usually operate in ring 3 Limits the type of memory peripheral device and driver access activity Controlled through the operating system or system calls Applications can make requests of the OS to perform necessary tasks it cannot perform. OS executes instructions in user mode for the application (system calls) 3 w Ring 0 Operating System Kernel W ord Processor E-m a il Ring 3 Ring 2 Ring 1 W e b B ro w s e r File System Drivers Operating System 3 2 1 1 2 3 Ring 1 = Remaining parts of the Operating System Ring 2 = I/O Drivers & Utilities Ring 3 = Applications & Programs More trusted processes Operate within lower Numbered - rings Protection Rings TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas 4 Protection Rings When an Operating System executes instructions in rings 0 and 1 it operates in either: Supervisor mode Privilege mode When an Operating System executes instructions in ring 3 it operates in: User Mode 5 What is a Domain? A set of objects that a subject is able to access Defines which objects are available to the subject and which objects are unusable by the subject The domain can be: All the resources a user can access All the files available to a program Memory segments available to a process Services and processes available to an application 6 Security Domain of Resources TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas 7 System Architecture Availability, integrity and confidentiality can be enforced at different places within an enterprise....
View Full Document

Page1 / 8

unit_4_p2_tech_7350_c5 - TECH 7350 Managing Information...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online