Question

In: Computer Science

How can a system for multi-level access control be implemented for government and military applications? What might access rules look like for such a system?

How can a system for multi-level access control be implemented for government and military applications? What might access rules look like for such a system?

 

 

Solutions

Expert Solution

In multilevel security access is given to user based on their role. It prevents users form obtaining access to information which they lack authorization. It is basically an application of computer system which helps to keep the system secure at different levels.

Some information is more sensitive than the others. The access to the information is given to user based on their role and requirement. An example can be given using military and gov organization.

The security level could be any number or category. In military or defense it could anything between these categories: Unclassified < Confidential < Secret < Top secret. These 4 categories are assigned based on the role of the individual.

Documents and files are marked with the level of security, which means how sensitive the information is, and individual are given security clearance according how trustworthy they are and what information they have demonstrated.


In multilevel security access is given to user based on their role

Related Solutions

What are the consequences of using advanced access in multi-specialty clinic? How might these tools be...
What are the consequences of using advanced access in multi-specialty clinic? How might these tools be applied to provide same-day scheduling?
Consider a multi-user system running a database server, with a role-based access control (RBAC) system. One...
Consider a multi-user system running a database server, with a role-based access control (RBAC) system. One role in this system is Database Developer, for those responsible for creating and populating new databases and database applications. A second role is Database Administrator, responsible for managing the configuration of the database server and database user accounts. Make two lists, one for each of these two roles, with names of permissions that might be assigned to each role. Be as specific as possible....
What would a hypothetical cross-tab might look like and how it would it relate to a...
What would a hypothetical cross-tab might look like and how it would it relate to a chi-square?
Describe life in the universe. What will it look like and how and where can we...
Describe life in the universe. What will it look like and how and where can we find it? This is a complex question with a complex answer, so be sure you consider both the solar system and the universe as a whole
How can a staff member ensure confidentiality in clinical settings? What strategies might be implemented by...
How can a staff member ensure confidentiality in clinical settings? What strategies might be implemented by the nurse manager or nurse educator to promote confidentiality? What safeguards can be used to ensure confidentiality when sending medical information by fax or by e-mail? I need references
Explain how designing an access control standard relates to system security practices.
Explain how designing an access control standard relates to system security practices.
Discuss the relevance of corporate governance. What does it look like? How can a company benefit...
Discuss the relevance of corporate governance. What does it look like? How can a company benefit from governance systems; i.e. what benefits are provided to decision makers? Provide an industry example of corporate governance that you have been involved in from research.
1. A. Given the chromosome arrangement shown below, draw what this chromosome might look like with...
1. A. Given the chromosome arrangement shown below, draw what this chromosome might look like with a pericentric inversion. The 'x' represents the centromere. (1 pt) A B C D x E F G H I B. Describe why being heterozygous for an inversion such as this might be detrimental. (1 pt) C. Would you expect to see any evidence of a defect or phenotype in someone homozygous for an inversion? Why or why not? (1 pt)
What might a companies recruitment, selection, training, compensation/motivation look like in the United States?
What might a companies recruitment, selection, training, compensation/motivation look like in the United States?
What might a better model to predict fertility look like, if you could get data on...
What might a better model to predict fertility look like, if you could get data on any additional variables at the country level? Be sure to explain the THEORY behind including these new variables in your analysis. Subject Econometrics
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT