CS459/559 - Network Security - Chapter 4: Security Levels
-
Department of Defense Guidelines
-
The Orange Book (Trusted Computer System Evaluation Criteria)
-
Security Policy (the system must enforce a well-defined security
policy)
-
Marking (Every object stored in a computer must be able to
be marked, in order to identify the object's security level)
-
Identification (All individual objects must be identified)
-
Accountability (Audit data must be kept and protected)
-
Assurance (the system must contain a mechanism that can be
independently evaluated, so as to provide assurance that the system enforces
requirements above)
-
Continuous protection against tampering or unauthorized changes.
-
The Red Book (Trusted Network Interpretation Environments
Guideline)
-
The Brown Book (The Guide to Understanding Trusted Facility
Management)
-
C2 Security
-
An individual wo owns a resource or file must have the capability
to control access to that resource
-
The OS must be able to prevent objects from being reused
by other processes
-
All users are required to enter a unique userid and password
before accessing the system
-
Authorized admin users must have access to audit data
-
The system must be able to protect itself from external tampering
-
Microsoft Windows NT
-
Novell IntranetWare
-
IBM OS/400
-
Discretionary Access Control
-
Access Control Matrix
-
Audit Capability