Question

In: Computer Science

Consider a system that combines the Military security policy andBell-LaPadula confidentiality model. Given the security...

Consider a system that combines the Military security policy and Bell-LaPadula confidentiality model. Given the security levelsTOP SECRET, SECRET, CONFIDENTIAL, andUNCLASSIFIED (ordered from highest to lowest), and compartments Students, Faculty, Staff, andContractors specify what type of access (read, write, both, none) is allowed in each of the following situations.

a) John, cleared for (TOP SECRET, {Faculty, Staff, Students}), wants to access a document classified as (TOP SECRET, {Faculty, Staff, Contractors}).

b) Bill, cleared for (CONFIDENTIAL, {Faculty, Students}), wants to access a document classified as (CONFIDENTIAL, {Students}).

c) Janet, cleared for (SECRET, {Faculty, Students}), wants to access document classified as (CONFIDENTIAL, {Faculty}).

d) Pete, cleared for (CONFIDENTIAL, {Faculty, Staff}), wants to access a document classified as (SECRET, {Staff}).

e) Chris, cleared for (CONFIDENTIAL, {Staff}) wants to access a document classified as (UNCLASSIFIED, {Staff}).

Solutions

Expert Solution

a) Read access only as contractors data write access should not be given to John.

b) Bill will be able to get a read and write access.

c) Janet can have read and write access as she has cleared the exam for a higher ordered security level.

d) None, as Pete has cleared for confidential whereas trying to access the secret files which is of a higher security level.

e) Chris has cleared confidential for staff hence he can have the read and write access both.


Related Solutions

A study is conducted to determine the security and confidentiality of personal information submitted over the...
A study is conducted to determine the security and confidentiality of personal information submitted over the Internet, including such things as social insurance and credit card numbers. A random sample of 1,000 adults were selected and asked under what circumstances they would give personal information to a company. 20% said they would never give personal data to a company, while 51% said they would if the company had strict privacy guidelines in place. Construct a 95% confidence interval for the...
One of the security threats is confidentiality breach. Explain what it is, how it can be...
One of the security threats is confidentiality breach. Explain what it is, how it can be detected and how it can be prevented.
1. Is it a security policy? 2. What type of security policy is described?
1. Is it a security policy? The textbook defines a security policy as, "... an overall general statement produced by senior management (or a selected policy board or committee) that dictates what role security plays within the organization". Is your selected document a security policy per this definition? If not then describe its purpose. Note that some items on this list may not really be security policies per this definition.2. What type of security policy is described? Assuming the document is...
What provisions should be included in a model privacy and security policy that patients might use...
What provisions should be included in a model privacy and security policy that patients might use in making decisions related to their privacy and the security of their PHRs?
Plan, Develop and Manage a Security Policy Background: Consider that the Commonwealth Government of Australia is...
Plan, Develop and Manage a Security Policy Background: Consider that the Commonwealth Government of Australia is planning to launch ‘My Health Record’ a secure online summary of an individual’s health information. The system is available to all Australians, My Health Record is an electronic summary of an individual’s key health information, drawn from their existing records and is designed to be integrated into existing local clinical systems. The ‘My Health Record’ is driven by the need for the Health Industry...
As you analyze information security and confidentiality and its impact on health care, respond to the...
As you analyze information security and confidentiality and its impact on health care, respond to the questions below. A. What are the differences between privacy and confidentiality? B. Discuss at least three areas in a health care setting where you would expect to see information security.
I need to research definitions of the terms privacy, confidentiality and security of health information to...
I need to research definitions of the terms privacy, confidentiality and security of health information to include in your post. As a health care manager, what responsibilities do you have to uphold these for your patients? Provide an example to illustrate your role and responsibility of protecting patient information.
Discuss the legislation that insures the privacy, confidentiality, and security needed to protect a patient's health...
Discuss the legislation that insures the privacy, confidentiality, and security needed to protect a patient's health information. Describe the HIPAA security safeguards and how these protect the healthcare organization or provider from penalties. Provide substantive responses to two of your classmates.
A traditional view of security promotes the idea that countries need a strong military to survive...
A traditional view of security promotes the idea that countries need a strong military to survive and achieve security. With a changing and more diverse set of challenges to security, is this traditional view still relevant or do countries need more and other resources? In other words, in our world today, what resources and expertise do state need for security? (as always, building on existing posts is preferable)
Consider the predicted model to study the effect of gender on wages given as: Model I:...
Consider the predicted model to study the effect of gender on wages given as: Model I: Wage = 7.10 -2.51female, n = 526 r^2 = .116 Now consider, Model II: wage= -1.57 - 1.81female+.572educ+.25exper+.141tenure with n = 526 and r^2 = .364 Compare the estimated gender gap in Model I and Model II. Briefly explain the difference.. out of model I and Model II which model you would choose? Based on you answer of the model choice, do you think...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT