Question

In: Computer Science

Q1. Classify and explain the Bell LaPadula and Biba Security Models policy and properties in detail....

Q1. Classify and explain the Bell LaPadula and Biba Security Models policy and properties in detail. Describe how vital these models are to the security and information security services as a whole. How are security services linked, and how do they support the security of information?

Q2. You offer storage services as a corporation and own a data warehouse estimated at USD 5,000,000 (including information & infrastructure). It is expected that 80% of the warehouse (including customer data) would be damaged/lost if the risk of a fire breaking out were to occur. For this warehouse-type, the probability of a fire breaking out is known to be 6% annually. Suppose you wanted to mitigate the risk to your data warehouse by implementing controls (safeguards) to decrease 50% (exactly half). Still, the cost of implementing these safeguards would be $40,000 per year. Explain why you should or should not buy the safeguards in a definitive quantitative case.

Solutions

Expert Solution

1.The Bell–LaPadula Model (BLP) is a state machine model used for enforcing access control in government and military applications. It was developed by David Elliott Bell and Leonard J. LaPadula, subsequent to strong guidance from Roger R. Schell, to formalize the U.S. Department of Defense (DoD) multilevel security (MLS) policy. The model is a formal state transition model of computer security policy that describes a set of access control rules which use security labels on objects and clearances for subjects. Security labels range from the most sensitive (e.g., "Top Secret"), down to the least sensitive (e.g., "Unclassified" or "Public").

The Bell–LaPadula model focuses on data confidentiality and controlled access to classified information, in contrast to the Biba Integrity Model which describes rules for the protection of data integrity. A system state is defined to be "secure" if the only permitted access modes of subjects to objects are in accordance with a security policy. To determine whether a specific access mode is allowed, the clearance of a subject is compared to the classification of the object (more precisely, to the combination of classification and set of compartments, making up the security level) to determine if the subject is authorized for the specific access mode. The clearance/classification scheme is expressed in terms of a lattice. The model defines one discretionary access control (DAC) rule and two mandatory access control (MAC) rules with three security properties:

The Simple Security Property states that a subject at a given security level may not read an object at a higher security level.

The * (star)Security Property states that a subject at a given security level may not write to any object at a lower security level.

The Discretionary Security Property uses an access matrix to specify the discretionary access control.

2. The methods and procedures already mentioned are designed to minimize casual loss of data and maximize media longevity. However, even if you had perfect storage conditions and impeccable handling protocols, some media would still fail. Therefore, valuable data must be stored redundantly, that is, backed up, on more than one piece of media. In addition, backups and disaster recovery plans are needed to avoid catastrophic media loss from causes such as:

sabotage (theft, vandalism, malicious modification/erasure, viruses, terrorist attack etc)

natural disaster (fire, flood, earthquake, hurricane, tornado, infrastructure failure)

A disaster recovery plan that deals specifically with information technology infrastructure is needed. Developing such a plan is not a one-time process; it has to be tested and modified as changing circumstances dictate. Revisit the disaster recovery plan for events such as new staff, new or reorganized physical plant, or new equipment. Once a disaster recovery plan is in place, take steps to prevent catastrophes and minimize damage from them.

The maintenance of redundant copies of valued digital content is an essential component of any digital preservation program, and a key element in the prevention of catastrophic loss. A great variety of backup solutions are available. Which to use depends on:

quantity of data

rate of change

degree of automation desired

available budget

n addition to backing up data files, application software and operating systems may also need backup. In some cases, it may be necessary to purchase additional licenses or obtain special permission from the software vendor in order to back up applications.

In addition to testing backup media periodically to ensure the data is still readable and has not been altered, restore procedures should also be tested to ensure that the hardware, software and any outside vendors involved in maintaining backups are all functioning as expected.

A prudent backup strategy places at least one copy of all critical data at a sufficient distance from the main data store so that it is not likely to succumb to the same disaster. This is called off-site storage.


Related Solutions

Consider a system that combines the Military security policy andBell-LaPadula confidentiality model. Given the security...
Consider a system that combines the Military security policy and Bell-LaPadula confidentiality model. Given the security levelsTOP SECRET, SECRET, CONFIDENTIAL, andUNCLASSIFIED (ordered from highest to lowest), and compartments Students, Faculty, Staff, andContractors specify what type of access (read, write, both, none) is allowed in each of the following situations.a) John, cleared for (TOP SECRET, {Faculty, Staff, Students}), wants to access a document classified as (TOP SECRET, {Faculty, Staff, Contractors}).b) Bill, cleared for (CONFIDENTIAL, {Faculty, Students}), wants to access a document...
(a) How does the main security aim of the Clark-Wilson model differ from that of the Bell-LaPadula model?
(a) How does the main security aim of the Clark-Wilson model differ from that of the Bell-LaPadula model? (b) Consider the following documents that have been created within the Bell-LaPadula security model. The levels are: top secret (ts), secret (s), confidential (c), and unclassified (uc). In addition to these levels, there are the following categories: development (D), production code (PC), and software tools (T) Document 1: c, {D, T} Document 2: s, {T, PC} Document 3: ts, { } Document 4: uc, {D, T, PC} Alice has...
Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to...
Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to file A, can append to file B, and can write to file C. Maha can read file A, can write to file B, and cannot access file C. Write the access control matrix M that specifies the described set of access rights for subjects Nada and Maha to objects file A, file B and file C. Then the subject’s security levels are LNada= Confidential...
Q1. Explain the solow-swan model in detail with graph.
Q1. Explain the solow-swan model in detail with graph.
Explain in detail each form of homeowner’s insurance policy.
Explain in detail each form of homeowner’s insurance policy.
Explain in detail the policy conclusions of the IS/LM/BP model
Explain in detail the policy conclusions of the IS/LM/BP model
Please explain the difference between monetary policy and fiscal policy AS detail as possible Thanks
Please explain the difference between monetary policy and fiscal policy AS detail as possible Thanks
What are the three channels of monetary policy? Explain each of these in detail. Also explain...
What are the three channels of monetary policy? Explain each of these in detail. Also explain under what conditions monetary expansion fail to affect aggregate demand for goods and services in the short run and long run.
Explain the difference between expansionary fiscal policy in the RBC and Keynesian models.
Explain the difference between expansionary fiscal policy in the RBC and Keynesian models.
Q1. Explain how industrial Ethernet can be incorporated in DCS systems. Q2. Explain in detail the...
Q1. Explain how industrial Ethernet can be incorporated in DCS systems. Q2. Explain in detail the self-diagnosis concepts of a DCS system.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT