System enforcing bibas strict integrity policy

Assignment Help Computer Network Security
Reference no: EM13192768

Consider the following system enforcing Biba's strict integrity policy for a software vendor.

The defined integrity levels for an access class are released (rel) > beta > demonstration (demo). The defined set of integrity categories are {internal, partner, customer} or {in, pa, cu}.

Consider a subject with an access class of (beta, {in, pa} ).

a)Can this subject read an object with an access class of (beta, {pa, cu} )?

b)Can this subject read an object with an access class of (rel, {pa, cu} )?

c)Can this subject read an object with an access class of (demo, {pa} )?

d)Can this subject write an object with an access class of (beta, {pa, cu} )?

e)Can this subject write an object with an access class of (rel, {cu} )?

f)Can this subject write to an object with an access class of (beta, {in,cu})

g)Can this subject invoke a subject with an access class of (beta, {in,pa} )?

h)Can this subject invoke a subject with an access class of (rel, {in, pa} )?

i)Can this subject invoke a subject with an access class of (demo, {in, pa, cu})?

j)Can this subject write an object with an access class of (demo, {in, pa, cu})?

Reference no: EM13192768

Questions Cloud

Compute the pickering series wavelength associated : the set of transitions where the electron falls from a higher level to the nf = 4 state is called the Pickering series, an important series in solar astronomy. Calculate the Pickering series wavelength associated with the excited state ni = 8.
Explain a system consisting of water and ethanol : Would it be possible to vary the temperature of a system consisting of water and ethanol (CH3CH2OH) while maintaining an equilibrium between solid, liquid, and vapor phases?
Difference between the terms safety and security : What is the difference between the terms ‘safety' and ‘security' and what is the conclusion of the paper?
State vapor phases of water to all be in equilibrium : vapor phases of water to all be in equilibrium with each other at 0.1 MPa (see equation below)? Explain in terms of Gibbs phase rule.
System enforcing bibas strict integrity policy : Consider the system enforcing Biba's strict integrity policy for a software vendor - defined integrity levels for an access class are released
State how many thermodynamic degrees of freedom : How many thermodynamic degrees of freedom are available to an equilibrium system consisting of an ice cube floating in a glass of water
Determine one mole of a monatomic ideal gas : Consider one mole of a monatomic ideal gas at 300 K that undergoes a free expansion from a volume of 1 m^3 to 10 m^3. a) How much does the chemical potential of each molecule in a gas change?
Compute the debroglie wavelength of the emitted electron : its ground state absorbs 2.50 times as much energy as the minimum required for it to escape from the atom. Calculate the deBroglie wavelength of the emitted electron
Write a program to define constant : Display each of these constants in decimal, in hexadecimal, and as a character usingcout.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Differentiate business continuity-disaster recovery planning

Business Continuity (BC) planning and Disaster Recovery (DR) planning are main elements in organizational security architectures. Write down the difference between them.

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Explain main targets seem to be larger or smaller companies

Research three recent information security breaches. Do the main targets seem to be larger or smaller companies? Is there a particular industry that seems predominately targeted?

  Basic function / purpose of a firewall

What is the basic function / purpose of a firewall? What are some different firewall implementations (stateful inspection, dual-homed, etc) and how might an organization use firewalls

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

  How will ad organizational units be organized

How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized

  The hr department has sensitive information

The HR department has sensitive information that can only be viewed by members of the HR department and executive offices. Each location has computers and printers for use within the individual departments but that not to be used by employees from an..

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  How rtsp vary from http in keeping client state information

How does RTSP differ from HTTP (a) in maintaining client state information; (b) in terms of in-band, out-of-band traffic?

  Write the different techniques use in detecting intrusion

Explain in detail about system security and write down the different techniques use in detecting intrusion. Explain the answer must be accompanied by algorithm.

  Explain the purpose of using cvss scores

Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)

  What security vulnerabilities and threats can you see

What security vulnerabilities and threats can you see? What measures would you put in place to remove or minimize the vulnerabilities - Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the a..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd