Question

In: Computer Science

Consider a system that combines the Military security policy andBell-LaPadula confidentiality model. Given the security...

Consider a system that combines the Military security policy and Bell-LaPadula confidentiality model. Given the security levelsTOP SECRET, SECRET, CONFIDENTIAL, andUNCLASSIFIED (ordered from highest to lowest), and compartments Students, Faculty, Staff, andContractors specify what type of access (read, write, both, none) is allowed in each of the following situations.

a) John, cleared for (TOP SECRET, {Faculty, Staff, Students}), wants to access a document classified as (TOP SECRET, {Faculty, Staff, Contractors}).

b) Bill, cleared for (CONFIDENTIAL, {Faculty, Students}), wants to access a document classified as (CONFIDENTIAL, {Students}).

c) Janet, cleared for (SECRET, {Faculty, Students}), wants to access document classified as (CONFIDENTIAL, {Faculty}).

d) Pete, cleared for (CONFIDENTIAL, {Faculty, Staff}), wants to access a document classified as (SECRET, {Staff}).

e) Chris, cleared for (CONFIDENTIAL, {Staff}) wants to access a document classified as (UNCLASSIFIED, {Staff}).

Solutions

Expert Solution

a) Read access only as contractors data write access should not be given to John.

b) Bill will be able to get a read and write access.

c) Janet can have read and write access as she has cleared the exam for a higher ordered security level.

d) None, as Pete has cleared for confidential whereas trying to access the secret files which is of a higher security level.

e) Chris has cleared confidential for staff hence he can have the read and write access both.


Related Solutions

Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to...
Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to file A, can append to file B, and can write to file C. Maha can read file A, can write to file B, and cannot access file C. Write the access control matrix M that specifies the described set of access rights for subjects Nada and Maha to objects file A, file B and file C. Then the subject’s security levels are LNada= Confidential...
A.Consider the Bell-LaPadula confidentiality model. Can a subject labeled ( “Secret”, {“France”} ) read the object...
A.Consider the Bell-LaPadula confidentiality model. Can a subject labeled ( “Secret”, {“France”} ) read the object labeled (“Top Secret”, {“France”,”Germany”} )? What property (rule) is applied to allow or to deny this operation? B. Consider the Biba integrity model. Can a subject labeled ( “Secret”, {“Germany”} ) write to the object labeled ( “Top Secret”, {“France”,”Germany”} )? What property (rule) is applied to allow or to deny this operation?
Q1. Classify and explain the Bell LaPadula and Biba Security Models policy and properties in detail....
Q1. Classify and explain the Bell LaPadula and Biba Security Models policy and properties in detail. Describe how vital these models are to the security and information security services as a whole. How are security services linked, and how do they support the security of information? Q2. You offer storage services as a corporation and own a data warehouse estimated at USD 5,000,000 (including information & infrastructure). It is expected that 80% of the warehouse (including customer data) would be...
(a) How does the main security aim of the Clark-Wilson model differ from that of the Bell-LaPadula model?
(a) How does the main security aim of the Clark-Wilson model differ from that of the Bell-LaPadula model? (b) Consider the following documents that have been created within the Bell-LaPadula security model. The levels are: top secret (ts), secret (s), confidential (c), and unclassified (uc). In addition to these levels, there are the following categories: development (D), production code (PC), and software tools (T) Document 1: c, {D, T} Document 2: s, {T, PC} Document 3: ts, { } Document 4: uc, {D, T, PC} Alice has...
What provisions should be included in a model privacy and security policy that patients might use...
What provisions should be included in a model privacy and security policy that patients might use in making decisions related to their privacy and the security of their PHRs?
Plan, Develop and Manage a Security Policy Background: Consider that the Commonwealth Government of Australia is...
Plan, Develop and Manage a Security Policy Background: Consider that the Commonwealth Government of Australia is planning to launch ‘My Health Record’ a secure online summary of an individual’s health information. The system is available to all Australians, My Health Record is an electronic summary of an individual’s key health information, drawn from their existing records and is designed to be integrated into existing local clinical systems. The ‘My Health Record’ is driven by the need for the Health Industry...
Consider the predicted model to study the effect of gender on wages given as: Model I:...
Consider the predicted model to study the effect of gender on wages given as: Model I: Wage = 7.10 -2.51female, n = 526 r^2 = .116 Now consider, Model II: wage= -1.57 - 1.81female+.572educ+.25exper+.141tenure with n = 526 and r^2 = .364 Compare the estimated gender gap in Model I and Model II. Briefly explain the difference.. out of model I and Model II which model you would choose? Based on you answer of the model choice, do you think...
The enthalpy of a simple (and not particularly realistic) model system is given by H =...
The enthalpy of a simple (and not particularly realistic) model system is given by H = c1 TP + c2T2 /2 where c1 and c2 are constants. 1. Evaluate the partial derivatives (∂H/∂T)p and (∂H / ∂P)t . Demonstrate that these partial derivatives satisfy the appropriate Maxwell relations and also determine cP. 2. Construct the inexact differentials (dH)T, (dH)P, and the exact differential, dH . 3. Integrate these three differential quantities along the following two paths that connect the same...
Part One Plan, Develop and Manage a Security Policy (10 marks) Background: Consider that the Commonwealth...
Part One Plan, Develop and Manage a Security Policy Background: Consider that the Commonwealth Government of Australia is planning to launch ‘My Health Record’ a secure online summary of an individual’s health information. The system is available to all Australians, My Health Record is an electronic summary of an individual’s key health information, drawn from their existing records and is designed to be integrated into existing local clinical systems. The ‘My Health Record’ is driven by the need for the...
Consider an inventory system that fits the model for a serial two-echelon system, where K1 =...
Consider an inventory system that fits the model for a serial two-echelon system, where K1 = $5,000, K2 = $200, h1 = $10, h2 = $11, and d = 100. Fill the values in the given table that shows the results from performing both separate optimization of the installations and simultaneous optimization of the installations hen calculate the percentage change in the total variable cost per unit time if the results from performing separate optimization were to be used instead...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT