Question

In: Computer Science

Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to...

Computer Security

Bell-LaPadula Model

Given the access rights as follows:

Nada can read and write to file A, can append to file B, and can write to file C. Maha can read file A, can write to file B, and cannot access file C. Write the access control matrix M that specifies the described set of access rights for subjects Nada and Maha to objects file A, file B and file C.

Then the subject’s security levels are LNada= Confidential and LMaha = Secret, and the object’s security levels are Lfile A= Unclassified, Lfile B = Secret, Lfile C= Top Secret (Top Secret > Secret > Confidential > Unclassified).

  1. a) Draw a Bell-LaPadula model which visualizes the access rights defined in access control matrix M.

  2. b) Using the Bell-LaPadula model, which of the following actions are allowed?Explainand justify your answer.

    1. Nada reads file A

    2. Nada reads file B

    3. Maha appends to file A

    4. Maha appends to file C

Solutions

Expert Solution

The access matrix is shown in the below attached image.

a) Bell-LaPadula model is drawn and attached in the below image.

b) Nada reads file A is possible.According to Bell-LaPadula model subject can get read access to objects whose security level is below the subject clearance level.Here Naha having a level of confidential and object A having a level of unclassified. Since confidential>unclassified, Naha can read file A.

Nada Reads File B: Nada's security level is confidential.It is lesser than secret (level of object B)To read the object it must be below security level than subject.So this operation not possible.

Maha appends to file A: According to Bell-LaPadula model subject can get append access to objects whose security level is higher than the subject clearance level.Here subject Maha is having a greater security level secret than FilA(unclassified).So this operation is not possible.

Maha appends to file C: This is possibile since the security level of File C(Top secret) is greater than that of subject Maha(secret)


Related Solutions

A.Consider the Bell-LaPadula confidentiality model. Can a subject labeled ( “Secret”, {“France”} ) read the object...
A.Consider the Bell-LaPadula confidentiality model. Can a subject labeled ( “Secret”, {“France”} ) read the object labeled (“Top Secret”, {“France”,”Germany”} )? What property (rule) is applied to allow or to deny this operation? B. Consider the Biba integrity model. Can a subject labeled ( “Secret”, {“Germany”} ) write to the object labeled ( “Top Secret”, {“France”,”Germany”} )? What property (rule) is applied to allow or to deny this operation?
(a) How does the main security aim of the Clark-Wilson model differ from that of the Bell-LaPadula model?
(a) How does the main security aim of the Clark-Wilson model differ from that of the Bell-LaPadula model? (b) Consider the following documents that have been created within the Bell-LaPadula security model. The levels are: top secret (ts), secret (s), confidential (c), and unclassified (uc). In addition to these levels, there are the following categories: development (D), production code (PC), and software tools (T) Document 1: c, {D, T} Document 2: s, {T, PC} Document 3: ts, { } Document 4: uc, {D, T, PC} Alice has...
Consider a system that combines the Military security policy andBell-LaPadula confidentiality model. Given the security...
Consider a system that combines the Military security policy and Bell-LaPadula confidentiality model. Given the security levelsTOP SECRET, SECRET, CONFIDENTIAL, andUNCLASSIFIED (ordered from highest to lowest), and compartments Students, Faculty, Staff, andContractors specify what type of access (read, write, both, none) is allowed in each of the following situations.a) John, cleared for (TOP SECRET, {Faculty, Staff, Students}), wants to access a document classified as (TOP SECRET, {Faculty, Staff, Contractors}).b) Bill, cleared for (CONFIDENTIAL, {Faculty, Students}), wants to access a document...
Q1. Classify and explain the Bell LaPadula and Biba Security Models policy and properties in detail....
Q1. Classify and explain the Bell LaPadula and Biba Security Models policy and properties in detail. Describe how vital these models are to the security and information security services as a whole. How are security services linked, and how do they support the security of information? Q2. You offer storage services as a corporation and own a data warehouse estimated at USD 5,000,000 (including information & infrastructure). It is expected that 80% of the warehouse (including customer data) would be...
Computer/Network Security How do you implement write access through web server?
Computer/Network Security How do you implement write access through web server?
The questions read as follows: home / study / engineering / computer science / computer science...
The questions read as follows: home / study / engineering / computer science / computer science questions and answers / Course Grades Java Class In A Course, A Teacher Gives The Following Tests And Assignments: ... Question: Course grades java class In a course, a teacher gives the following tests and assignments: A lab ... course grades java class In a course, a teacher gives the following tests and assignments: A lab activity that is observed by the teacher and...
Design a random-access digital memory that can write or read single bits in two addressable SRFFs...
Design a random-access digital memory that can write or read single bits in two addressable SRFFs having 3-bit addresses 5 and 7. The memory has the following inputs and outputs. Address input lines A2, A1, A0, Data input line DIN, and Data output line DOUT, Read/Write input line RW (RW = 0 stores DIN into addressed memory. RW = 1 puts addressed memory data on DOUT)
Discuss security in the cloud using the shared responsibility model and identity and access management (IAM)....
Discuss security in the cloud using the shared responsibility model and identity and access management (IAM). Discuss the networking services that can be used to build a VPC for the company.
Read the article "Grizzly Man, Sentimentality and Our Relationships with Other Animals" by Bell M. Write...
Read the article "Grizzly Man, Sentimentality and Our Relationships with Other Animals" by Bell M. Write an essay where you explain your point of view on human relationships with other animals. Be sure to explain whether it is possible for humans to have "genuine" relationships with other animals and what that means for how we ought to treat other animals. Your essay should make use of some of the ideas about sentimentality in the above paper. Minimum length 500 words.
You can use up to three levels of security and protection to control who can access...
You can use up to three levels of security and protection to control who can access and change your Excel data. Please describe two of the three levels and how you access each of them.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT