null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
355668
U3.1 Access Control
Descripción
Masters Comp Sec Mapa Mental sobre U3.1 Access Control, creado por Craig Parker el 13/11/2013.
Sin etiquetas
comp sec
comp sec
masters
Mapa Mental por
Craig Parker
, actualizado hace más de 1 año
Más
Menos
Creado por
Craig Parker
hace alrededor de 11 años
36
0
0
Resumen del Recurso
U3.1 Access Control
Permit or deny user access to computer resources according to redefined security policy
Who/What (system/user) is allowed to read and write to system resources
Reference Monitor
Establishes validity of access requests
REFERENCE MONITOR > either grants or denies request
Subject tries an Access request >
System decision
Part of the OS. Its integrity is extremely Important
Subjects
Can be user or process
Will try gain access
May be represented by more than 1 principal
Objects
passive entity / resource in a computer system. IE:file / directory.
Principal
attribute or property associated with a subject
User ID, process running on behalf of the user
Subject may be represented by more than 1 principal
Unix has 3 Access Operations
read (r)
write (w)
does not include read
execute (e)
For file access meanings are clear
For directory access
read
list the contents of the directory
write
create or rename the files in the directory
execute
enter the directory.
For directory permissions are listed consecutivly in a row
IE drwxr-xr--
d indicates driectory, the next 3 are owners positions, following 3 groups permissions, remaining = everyone elses permissions
Bell-LaPladula
Assigns security labels
Policy that information may not flow downwards from a high level to a lower level entity
Observe mode
read / write
Alter mode
append / write
Access Operations - Interaction between a subject and an object that causes a flow of information
4 Primitive Access Operations
Read
Can observe and object. Read only
Write
Able to read and write or alter/delete objects
Write includes read
Execute
Allows the subject to use the object without reading or writing
Subject runs a program, or access a crypto key
Append
Sometimes = blind write or write only. subject allowed to alter the object without observing contents
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
U2.1 Comp Sec: deals with prevention & detection of unauthorised actions by users of a comp system
Craig Parker
U3.2 Access Control Structures
Craig Parker
U3. Labels & Access Control
Craig Parker
U2.2 Fundamentals
Craig Parker
U3.3 Administration
Craig Parker
U4. Security Models & Policy
Craig Parker
U4. Bell-LaPladula
Craig Parker
U4. Biba
Craig Parker
U4. Further Aspects of BLP
Craig Parker
U4. Harrison–Ruzzo–Ullman
Craig Parker
U4. Chinese Wall
Craig Parker
Explorar la Librería