Question

In: Computer Science

I. Describe the differences between discretionary access control model and mandatory access control model II. File...

I. Describe the differences between discretionary access control model and mandatory access control model

II. File permissions in Linux can be also represented in digits from 0-7 for the owner, group and others with reading as the most significant bit (E.g., the value 6 represents the permission right rw- for a file). Suppose a file in Linux has the permission as the digits 764.

• What does this permission right indicate for the owner/user, group and others?

• What is the letter representation of this permission right?

Solutions

Expert Solution

Mandatory Access Control (MAC) and Discretionary Access Control (DAC) are two popular access control models which provide users access to the data they require in the multiple-user environment.

Differences:

1. In MAC, resources allocation to the user is done by the operating system (system administrator). While, each user has access to its own data in the DAC.

2. In MAC, administrator creates the access levels which are provided to each user specifically and users can access resources within its access level. While DAC maintains a list of users which can access a particular resource.

3. In MAC, administrators have only right to alter permission levels and to provide resource allocation to all the users. While in DAC, the users which can access data of a particular resource can provide resource to others user by including them in the list.

4. While dealing with large number of the users, MAC provides ease in maintenance and establishment of the access because we need single levels for each resource and each user. In DAC we need identity of each user who needs access to the resource data.

5. In MAC, we cannot give access to a particular resource directly because we need to give the user access level which gives him/her access to all the resources in the access level. While in DAC, we just need to add the user in the list of that resource providing flexibility.

6. In MAC, it is easier to keep track of the users who have access to the resources as the administrator only has rights to change. While in DAC, it seems problematic to track usage of the resource as all the user have right to add other users.

7. In DAC, we need to perform more work as compared to the MAC.


Related Solutions

- What is the order of precedence between discretionary access check and Mandatory integrity check? Please...
- What is the order of precedence between discretionary access check and Mandatory integrity check? Please explain? - Suppose kkk.exe running with low integrity downloads an executable from unknownsite.com. can the download executable write to %SystemRoot%\System32? Why or Why not?
For meiosis, describe the major differences between metaphase I and metaphase II? How is anaphase I...
For meiosis, describe the major differences between metaphase I and metaphase II? How is anaphase I in meiosis different than anaphase in mitosis? Explain how meiosis II is more like mitosis than meiosis one is. Define a tetrad of chromosomes. In what ways are homologous chromosomes similar to each other and different than each other? Please type the answer. Don't write on the paper, type the answer here
For meiosis, describe the major differences between metaphase I and metaphase II? How is anaphase I...
For meiosis, describe the major differences between metaphase I and metaphase II? How is anaphase I in meiosis different than anaphase in mitosis? Explain how meiosis II is more like mitosis than meiosis one is. Define a tetrad of chromosomes. In what ways are homologous chromosomes similar to each other and different than each other? Please answer all question in full typed
For meiosis, describe the major differences between metaphase I and metaphase II? How is anaphase I...
For meiosis, describe the major differences between metaphase I and metaphase II? How is anaphase I in meiosis different than anaphase in mitosis? Explain how meiosis II is more like mitosis than meiosis one is. Define a tetrad of chromosomes. In what ways are homologous chromosomes similar to each other and different than each other? Please answer all question in full typed
Describe in detail the similarities and differences between mitosis, meiosis I and meiosis II. Make sure...
Describe in detail the similarities and differences between mitosis, meiosis I and meiosis II. Make sure your answer includes the formation of tetrads and whether the products are haploid or diploid and have replicated or unreplicated DNA.
Consider using mandatory access controls and compartments to implement an ORCON control. Assume that there are...
Consider using mandatory access controls and compartments to implement an ORCON control. Assume that there are k different organizations. Organization i will produce n(i, j) documents to be shared with organization j. a. How many compartments are needed to allow any organization to share a document with any other organization? b. Now assume that organization i will need to share nm(i, i1, ..., im) documents with organizations i1, ..., im. How many compartments will be needed?
Describe the differences between media bias (type I), media bias (type II), and propaganda. Give an...
Describe the differences between media bias (type I), media bias (type II), and propaganda. Give an example of each of these.
In reference to network access control, describe some of the access control mechanism used by a...
In reference to network access control, describe some of the access control mechanism used by a network administrator to filter, inspect and detect different forms of traffic.
Role-based access control (RBAC), an accepted model for access control in enterprise environments, may provide the...
Role-based access control (RBAC), an accepted model for access control in enterprise environments, may provide the means for conditions effectively restrict access based on rules and prerequisite conditions. However, there may be weaknesses in this approach. Provide strengths and weaknesses of role-based access control use in any size organization of your choice.
Please give me the differences between BASEL I and BASEL II agreement.
Please give me the differences between BASEL I and BASEL II agreement.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT