Note-12

Note-12 - CSE 467/598 Data and Information Security Prof....

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CSE 467/598 Data and Information Security Prof. Gail-Joon Ahn IMPORTANT DATES ! Project: ! Phase II: 11:59PM, March 24, 2011 ! Exam #1 (Midterm): Mar 8, 2011 ! Spring Break: Mar 15 & 17, 2011 (no class) ! Class Presentation : April19, 21, 26, and 28, 2011 (paper report due) ! Exam #2 (Final): May 10, 2011 (12:00PM 2:00 PM) 2 Cyber Gazette ! Cybersecurity and Internet Freedom Act of 2011 Privacy and civil liberties advocates argue that the revised bill still gives the government too much power. A legislative counsel of the American Civil Liberties Union (ACLU) indicated that the amended bill could infringe upon citizen's First Amendment rights. Despite their concerns, members of the ACLU take no issue with an overwhelming majority of the 221-page bill, including provisions to support research and development, bolster the nation's cybersecurity workforce and create a cybersecurity center within the U.S. Department of Homeland Security. 3 based on slides for "Computer Security: Art and Science" 4 Reading and Writing Information ! Information flows up , not down ! Reads up disallowed, reads down allowed ! Security Condition " Subject s can read object o iff L ( s ) dom L ( o ) and s has permission to read o ! Writes up allowed , writes down disallowed ! *-Property " Subject s can write object o iff L ( o ) dom L ( s ) and s has permission to write o Security level and security label are interchangeable terms from this point based on slides for "Computer Security: Art and Science" 5 Types of Tranquility ! Strong Tranquility ! The clearances of subjects, and the classifications of objects, do not change during the lifetime of the system ! Weak Tranquility ! The clearances of subjects, and the classifications of objects, do not change in a way that violates the simple security condition or the *-property during the lifetime of the system based on slides for "Computer Security: Art and Science" 6 Types of Tranquility ! Strong Tranquility ! The clearances of subjects, and the classifications of objects, do not change during the lifetime of the system based on slides for "Computer Security: Art and Science" 7 Problem: Who talks to who? ! Let ! Colonel has (Secret, {NUC, EUR}) label ! Major has (Secret, {EUR}) label ! Major can communicate to colonel (write up and read down OK ) ! Colonel cannot communicate to Major (read up/down but write down NOT OK ) based on slides for "Computer Security: Art and Science" 8 Solution ! Define maximum, current levels for subjects ! maxlevel ( s ) dom curlevel ( s ) ! Example ! Treat Major as an object (Colonel is writing to him/her) ! Colonel has maxlevel (Secret, { NUC, EUR })...
View Full Document

Page1 / 15

Note-12 - CSE 467/598 Data and Information Security Prof....

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online