Computer Security U3 - Access Control

Nick.Bell2013
Mind Map by , created over 6 years ago

Mind Map on Computer Security U3 - Access Control, created by Nick.Bell2013 on 04/30/2013.

39
9
0
Tags No tags specified
Nick.Bell2013
Created by Nick.Bell2013 over 6 years ago
Chemistry Module C1: Air Quality
James McConnell
French Tense Endings
James Hoyle
EEO Terms
Sandra Reed
Maths GCSE - What to revise!
livvy_hurrell
GCSE Maths: Understanding Pythagoras' Theorem
Micheal Heffernan
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
SSCP Domains
Abdul Issa
Computer Security Potential Flaws
Rob Speirs
Chemistry General Quiz - 2
lauren_johncock
GCSE Maths Notes: Averages
Andrea Leyden
Computer Security U3 - Access Control
1 What is access control?
1.1 controls interaction
1.1.1 users
1.1.2 system resources
1.2 security policy
1.2.1 requirements
1.2.1.1 organisational
1.2.1.2 statutory
1.2.1.3 Confidentiality
1.2.1.4 Integrity
1.3 Access Request
1.3.1 Reference Monitor
1.3.1.1 System Decision
1.4 Subjects
1.4.1 Objects
1.4.1.1 passive
1.4.2 active
1.4.2.1 principal
2 Access Operations
2.1 flow of information
2.1.1 read
2.1.2 write
2.1.3 execute
2.1.4 append
2.2 Unix
2.2.1 read
2.2.2 write
2.2.3 execute
2.3 Bell-LaPadula
2.3.1 info flow policy
2.3.2 access modes
2.3.2.1 observe
2.3.2.2 alter
3 Structures
3.1 AC Matrix
3.1.1 s,o,a
3.1.2 rows indexed
3.2 AC List
3.2.1 columns in AC Matrix
3.3 Capability List
3.3.1 rows in AC Matrix
3.3.1.1 subject-oriented system
4 Administration
4.1 Groups
4.1.1 layer between subjects & objects
4.2 Roles
4.2.1 collection of access ops assigned to users
4.3 Groups vs Roles
4.3.1 Role Based Access Control (RBAC)
5 Security Labels
5.1 Protection Rings
5.1.1 QNX/Neutrino microkernel
5.1.2 VSTa microkernel
5.2 BLP
5.2.1 confidentiality policy
5.2.2 all conditions satisfied
5.2.3 'need-to-know' security latice
5.2.3.1 label subjects & objects
5.2.3.1.1 ordered pair of properties
5.2.3.1.1.1 security lavel
5.2.3.1.1.2 'need-to-know' categories

Media attachments