Question

In: Computer Science

How can a system for multi-level access control be implemented for government and military applications? What might access rules look like for such a system?

How can a system for multi-level access control be implemented for government and military applications? What might access rules look like for such a system?

 

 

Solutions

Expert Solution

In multilevel security access is given to user based on their role. It prevents users form obtaining access to information which they lack authorization. It is basically an application of computer system which helps to keep the system secure at different levels.

Some information is more sensitive than the others. The access to the information is given to user based on their role and requirement. An example can be given using military and gov organization.

The security level could be any number or category. In military or defense it could anything between these categories: Unclassified < Confidential < Secret < Top secret. These 4 categories are assigned based on the role of the individual.

Documents and files are marked with the level of security, which means how sensitive the information is, and individual are given security clearance according how trustworthy they are and what information they have demonstrated.


In multilevel security access is given to user based on their role

Related Solutions

What are the consequences of using advanced access in multi-specialty clinic? How might these tools be...
What are the consequences of using advanced access in multi-specialty clinic? How might these tools be applied to provide same-day scheduling?
Consider a multi-user system running a database server, with a role-based access control (RBAC) system. One...
Consider a multi-user system running a database server, with a role-based access control (RBAC) system. One role in this system is Database Developer, for those responsible for creating and populating new databases and database applications. A second role is Database Administrator, responsible for managing the configuration of the database server and database user accounts. Make two lists, one for each of these two roles, with names of permissions that might be assigned to each role. Be as specific as possible....
What would a hypothetical cross-tab might look like and how it would it relate to a...
What would a hypothetical cross-tab might look like and how it would it relate to a chi-square?
Describe life in the universe. What will it look like and how and where can we...
Describe life in the universe. What will it look like and how and where can we find it? This is a complex question with a complex answer, so be sure you consider both the solar system and the universe as a whole
How can a staff member ensure confidentiality in clinical settings? What strategies might be implemented by...
How can a staff member ensure confidentiality in clinical settings? What strategies might be implemented by the nurse manager or nurse educator to promote confidentiality? What safeguards can be used to ensure confidentiality when sending medical information by fax or by e-mail? I need references
Explain how designing an access control standard relates to system security practices.
Explain how designing an access control standard relates to system security practices.
What might the presidency look like in 50 years. Will america needs to rethink the presidency.?...
What might the presidency look like in 50 years. Will america needs to rethink the presidency.? Explain your answer in minimum two paragraphs (8 sentences each).
Research the company and describe what the career path for a project manager might look like...
Research the company and describe what the career path for a project manager might look like within the selected company.
Discuss the relevance of corporate governance. What does it look like? How can a company benefit...
Discuss the relevance of corporate governance. What does it look like? How can a company benefit from governance systems; i.e. what benefits are provided to decision makers? Provide an industry example of corporate governance that you have been involved in from research.
1. A. Given the chromosome arrangement shown below, draw what this chromosome might look like with...
1. A. Given the chromosome arrangement shown below, draw what this chromosome might look like with a pericentric inversion. The 'x' represents the centromere. (1 pt) A B C D x E F G H I B. Describe why being heterozygous for an inversion such as this might be detrimental. (1 pt) C. Would you expect to see any evidence of a defect or phenotype in someone homozygous for an inversion? Why or why not? (1 pt)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT