Computer Security U3 - Access Control

Descrição

Mapa Mental sobre Computer Security U3 - Access Control, criado por Nick.Bell2013 em 30-04-2013.
Nick.Bell2013
Mapa Mental por Nick.Bell2013, atualizado more than 1 year ago
Nick.Bell2013
Criado por Nick.Bell2013 mais de 11 anos atrás
48
9

Resumo de Recurso

Computer Security U3 - Access Control
  1. What is access control?
    1. controls interaction
      1. users
        1. system resources
        2. security policy
          1. requirements
            1. organisational
              1. statutory
                1. Confidentiality
                  1. Integrity
                2. Access Request
                  1. Reference Monitor
                    1. System Decision
                  2. Subjects
                    1. Objects
                      1. passive
                      2. active
                        1. principal
                    2. Access Operations
                      1. flow of information
                        1. read
                          1. write
                            1. execute
                              1. append
                              2. Unix
                                1. read
                                  1. write
                                    1. execute
                                    2. Bell-LaPadula
                                      1. info flow policy
                                        1. access modes
                                          1. observe
                                            1. alter
                                        2. Structures
                                          1. AC Matrix
                                            1. s,o,a
                                              1. rows indexed
                                              2. AC List
                                                1. columns in AC Matrix
                                                2. Capability List
                                                  1. rows in AC Matrix
                                                    1. subject-oriented system
                                                3. Administration
                                                  1. Groups
                                                    1. layer between subjects & objects
                                                    2. Roles
                                                      1. collection of access ops assigned to users
                                                      2. Groups vs Roles
                                                        1. Role Based Access Control (RBAC)
                                                      3. Security Labels
                                                        1. Protection Rings
                                                          1. QNX/Neutrino microkernel
                                                            1. VSTa microkernel
                                                            2. BLP
                                                              1. confidentiality policy
                                                                1. all conditions satisfied
                                                                  1. 'need-to-know' security latice
                                                                    1. label subjects & objects
                                                                      1. ordered pair of properties
                                                                        1. security lavel
                                                                          1. 'need-to-know' categories

                                                                  Semelhante

                                                                  Certified Information Systems Security Professional (CISSP)
                                                                  GoAsk Chaz
                                                                  SSCP Domains
                                                                  Abdul Issa
                                                                  Computer Security Potential Flaws
                                                                  Rob Speirs
                                                                  Francês
                                                                  BeatrizL
                                                                  English - prepositions (at, in, on)
                                                                  jdbenthien
                                                                  ORAÇÕES SUBORDINADAS ADVERBIAIS
                                                                  trackerian
                                                                  Classes de Palavras
                                                                  adrianegonaves
                                                                  Geologia 10º Ano
                                                                  Maria Ferreira
                                                                  Endotérmico ou Exotérmico?
                                                                  Andrea Borges
                                                                  Redação Oficial
                                                                  Lavs Agah