Discretionary Access Control Case Study

Superior Essays
1. Explain why mandatory access control (MAC) is better than discretionary access control (DAC)?
Answer: Both mandatory access control (MAC) and discretionary access control (DAC) are important in a multiple user environment where restrictions are very important. Both are popular access control models. But they have some differences. We will find out these differences and the facts that will prove mandatory access control is better than discretionary access control.
Basically, they provide access to users in different ways. A set of levels are created in mandatory access control and every user must be assigned to a specific access level. User can access all the resources under his access level. But in discretionary access control, accesses
…show more content…
What are the main deficiencies of the traditional (MAC)?
Answer: Though traditional MAC mechanism has multilevel security policy but this traditional mechanism has some limitations to fulfill many security requirements. It has limitations on data integrity, application integrity, lower privilege requirement and separation of duty. It is unable to control the relationship among a subject and executed code.
Mac mechanism is the most secure access control model but it is costly. It requires huge amount of planning before it is implemented effectively. After implantation, MAC enforces a high system management overhead because of necessity of constant update object and levels of account to contain new data. It also requires changing the category of existing users and as well as new users frequently. In MAC model, the enforcement and assignment of security levels place restrictions on user that require large part of the operating system. Furthermore it is impossible to implement MLS using mandatory access control (MAC) because whole operating system and other related utilities need to
…show more content…
Explain what are the main improvements of Flask from traditional MAC?
Answer: We know that traditional MAC has several limitations such as it provides very poor support for data integrity and application integrity. It is unable to find out separation of duty in MAC and it has smallest amount of privilege requirements. For this reason, NSA and SCC jointly developed flask to overcome the limitations of traditional MAC. Flasks have several improvements over traditional MAC.
Flask provides better support for dynamic security policies during the time of transfer. Flask is a strong and flexible security model than MAC. Flask is acceptable for all mainstream operating systems. It provides flexible support for security policies. It separates the security policy logic from the enforcement mechanism. Traditional mandatory access control (MAC) is associated with performance overhead, but performance overhead is minimized in the flask architecture. Flask ensures the system to support verity of security policies. Flask supports separation policies that can restrict data. It can also establish precise roles for the users. Flask supports containment policies that can restrict or filter data access and also can protect data from viruses or other suspicious programs. Flask also supports integrity policies that can protect data and application from unauthorized users. Furthermore, Flask has invocation policies that ensure data process based on the requirement. A security level is assigned

Related Documents

  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    7. Application Access Control Access to programming, framework utilities and project source libraries might be controlled and confined to those approved clients who have a sensible industry need frameworks or database administrators. Approval to utilize an application might rely on upon the accessibility of a permit from the supplier. Give security from unapproved access by any utility, OS software, and malicious programming that is equipped for bypassing framework or application controls.…

    • 118 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Media information systems should be controlled and physically protected to prevent damage to assets and interruption to business activities. Appropriate procedure should be established to protect documents, computer media, the data input / output and documented system from damage, theft and unauthorized access. 7. Attention should be given to protect the integrity of electronically published information to prevent modifications that may harm the company's reputation. The information provided to the public, such as information on the web that can be accessed via the internet must be in accordance with the laws, rules, and regulations in the jurisdiction 8.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    My second reason is Apple does not want to make a software because it can fall in the ronf hand of a person. Hir his my evidence it will fall in the wrong hand of a hack then it will go down to the reason then it will be pass on. And If they do make a Soft ware the device will have to be pass on to military place and this can lead to bad thing. And is can be used for…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    The following controls must be in place: 1. Specify: the specific system privileges required. 2. Document: the approved authorization of both the direct manager and the Information Owner or Resource Administrator of the Protected Information. 3.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    These information systems are: • LAN – Switches, routers and firewall • Servers -- SHGTS Microsoft Access 97 database, Remote access server (RAS) • Workstations • Communication network – Phone and IP phones • Agency data processing center including its operating systems and utilities • Tactical radio network • Shared information processing service facilities (Bowen, Hash, & Swanson, 2006). A5: IT infrastructure that includes a description of information flow JINX application server is housed in room 1234, located at the HBWC’s executive office facility. This is a Microsoft Windows NT application server that is customized to run several applications including Microsoft Access 97 database that is used specifically for SHGTS. The database tracks all data and activities related to the grant distribution, grant users access the database to complete their grant…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The few main differences I have found are installation methods, pricing, and the way the programs are updated. Below you will see an analysis of these systems and what it has to offer for the veterinarian professional…

    • 1470 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    HIPAA Compliance

    • 1020 Words
    • 5 Pages

    With more medicinal experts utilizing individual cell phones to discuss and work together on patient concerns, it is imperative that human services associations address the utilization of innovation and HIPAA consistence. Numerous types of much of the time utilized correspondence are not HIPAA agreeable. Unsecure channels of correspondence by and large incorporate SMS, Skype and email since duplicates of messages are left on administration suppliers' servers over which a social insurance association has no control. List of technology that works with HIPAA: -Any…

    • 1020 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    HIPAA was enacted to provide a variety of protections for individuals and their health insurance, including access, portability, fraud and abuse protections and administrative simplification. The main thing we focus on is the Privacy, Security and Enforcement Rules for our patients. Which HITECH had extended the Privacy and Security Rules of HIPAA. HIPAA is divided into two sections. Section I protects the health insurance rights of workers who change or lose their jobs.…

    • 235 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Police Discretion Thesis

    • 579 Words
    • 3 Pages

    1.Topic: Police Discretion Thesis Statement: Police discretion is a very important aspect of law enforcement, however, there is controversy surrounding whether law should be enforced to the latter or to it's spirit. Although what defines police discretion can be unclear, it is necessary, as every situation has a different context and therefore a should have a different consequence. 2. The percentage of crime offenders by race very closely matches the race percentage of those who are incarcerated. (“California: The Color of Crime”; Inmate Statistics)…

    • 579 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Command Prompt

    • 1077 Words
    • 5 Pages

    Introduction Organizations handle vast amounts of data. A large organization may have to deal with terabytes or petabytes worth of data. For a company to be successful, there must be a meaningful way in which the data that is used as a part of company operations is managed. This includes an effective file management system, in which the files are appropriately secured, and the information is backed up in order to meet company requirements. The files generated as a part of company operations are company property, and as such the information must be managed effectively.…

    • 1077 Words
    • 5 Pages
    Superior Essays