Question

In: Computer Science

(a) How does the main security aim of the Clark-Wilson model differ from that of the Bell-LaPadula model?


(a) How does the main security aim of the Clark-Wilson model differ from that of the Bell-LaPadula model? 

(b) Consider the following documents that have been created within the Bell-LaPadula security model. The levels are: top secret (ts), secret (s), confidential (c), and unclassified (uc). In addition to these levels, there are the following categories: development (D), production code (PC), and software tools (T) 

Document 1: c, {D, T} 

Document 2: s, {T, PC} 

Document 3: ts, { } 

Document 4: uc, {D, T, PC} 

Alice has secret clearance with access to the categories {D, T}. Determine which documents Alice can read. Determine also which documents Alice can write to. 

Solutions

Expert Solution

Answer a

Bell-LaPadula model focuses on data confidentiality and controlled access to the classified information. In this subject has a security clearance and object has a security classification for e.g. Top Secret, Secret, Confidential etc. Main focus is to decide the manner by which a subject may access a object.

Security level

Subject

Object

Top Secret

Tamara

Personnel Files

Secret

Samuel

E-Mail Files

Confidential

Claire

Activity Logs

Unclassified

James

Telephone Lists

This means Tamara can read all files but Claire cannot read personal and email files.

On the other side, Clark-Wilson focuses on Integrity of data rather than confidentiality. It relies on two concepts to make sure data integrity.

1. Well Formed Transactions: User can manipulate data only in constrained way.

2. Separation of Duty: One can create the transaction but not execute it.

These are the basic terminology used in this model.

CDI: constrained data items (loan app; checks)

UDI: unconstrained items

IVPs: procedures that assure all CDIs conform to integrity/consistency rules

TPs: transactions that change CDIs

Below rules are certified and enforced in this model.

C1: IVPs must ensure that all CDIs are in valid states

C2: All TPs must be certified (must take a CDI from a valid state to a valid final state) –(Tpi, CDIa, CDIb, CDIc, …)

E1: The system must maintain a list of relations specified in C2

E2: The system must maintain a list of (User, Tpi, (CDIa, CDIb, …))

C3: The list of relations in E2 must be certified to meet separation of duties

E3 The system must authenticate each user when executing a TP

C4: All TPs must be certified

C5: Any TP that takes UDI as in input value must be certified to perform valid transaction

E4: Only the agent permitted to certify entitles is allowed to do so

Answer b:

According to this model these two rules are followed when deciding read and write.

1. No Read Up - A subject can only read an object of less or equal security level.

2. No Write Down - A subject can only write an object of greater or equal security level.

Now, Alice has security clearance with access to the {D, T} Categories means document 1 type of data which has Confidential level assigned.

Now confidential level is higher than the unclassified so Alice can also read document 4 which is {D, T, PC} apart from document 1.

Confidential level is lower than the Secret and Top Secret so Alice can write only in document 1 and document 2 which is {T, PC}. Alice also can write in document 3 but there is no item in document 3.


Related Solutions

Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to...
Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to file A, can append to file B, and can write to file C. Maha can read file A, can write to file B, and cannot access file C. Write the access control matrix M that specifies the described set of access rights for subjects Nada and Maha to objects file A, file B and file C. Then the subject’s security levels are LNada= Confidential...
Q1. Classify and explain the Bell LaPadula and Biba Security Models policy and properties in detail....
Q1. Classify and explain the Bell LaPadula and Biba Security Models policy and properties in detail. Describe how vital these models are to the security and information security services as a whole. How are security services linked, and how do they support the security of information? Q2. You offer storage services as a corporation and own a data warehouse estimated at USD 5,000,000 (including information & infrastructure). It is expected that 80% of the warehouse (including customer data) would be...
Consider a system that combines the Military security policy andBell-LaPadula confidentiality model. Given the security...
Consider a system that combines the Military security policy and Bell-LaPadula confidentiality model. Given the security levelsTOP SECRET, SECRET, CONFIDENTIAL, andUNCLASSIFIED (ordered from highest to lowest), and compartments Students, Faculty, Staff, andContractors specify what type of access (read, write, both, none) is allowed in each of the following situations.a) John, cleared for (TOP SECRET, {Faculty, Staff, Students}), wants to access a document classified as (TOP SECRET, {Faculty, Staff, Contractors}).b) Bill, cleared for (CONFIDENTIAL, {Faculty, Students}), wants to access a document...
A.Consider the Bell-LaPadula confidentiality model. Can a subject labeled ( “Secret”, {“France”} ) read the object...
A.Consider the Bell-LaPadula confidentiality model. Can a subject labeled ( “Secret”, {“France”} ) read the object labeled (“Top Secret”, {“France”,”Germany”} )? What property (rule) is applied to allow or to deny this operation? B. Consider the Biba integrity model. Can a subject labeled ( “Secret”, {“Germany”} ) write to the object labeled ( “Top Secret”, {“France”,”Germany”} )? What property (rule) is applied to allow or to deny this operation?
How does a TIPS bond differ from the typical U.S. Treasury security?
How does a TIPS bond differ from the typical U.S. Treasury security?
1) How does a bailment differ from a gift? 2) How does a bailment differ from...
1) How does a bailment differ from a gift? 2) How does a bailment differ from a lease? 3) Give an example of a bailment that is not a contract. Give an example of a bailment that is a contract.
How does a disclaimer differ from a qualified report in the PCAOB new reporting model?
How does a disclaimer differ from a qualified report in the PCAOB new reporting model?
Describe the Spine Center model. How does it differ from prevailing approaches to the delivery of...
Describe the Spine Center model. How does it differ from prevailing approaches to the delivery of spine care?
How does bank regulation differ from bank supervision? What are the main roles and functions of...
How does bank regulation differ from bank supervision? What are the main roles and functions of bank regulators? Discuss.
how does urine differ from blood
how does urine differ from blood
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT