Consider that there are three files in the following ranges (R1, R2, R3): File F1: [(Unclassified,{C0,C1}), (Confidential,{C0,C1,C3})] – R1 File F2: [(Confidential,{C1,C2}), (Secret,{C0,C1,C2,C3})] – R2 File F3: [(Secret,{C1,C2,C3}), (Top Secret,{C0,C1,C2,C3})] – R3 Subject S1 has the classification (Secret,{C0,C1,C2,C3,C4}). Which files can he access and how ( Fill in the table)? Justify your answer. File Access F1 F2 F3 Subject S2 has the classification (Top Secret,{C0,C1,C2,C3}). Which files can he access and how ( Fill in the table)? Justify your answer. File Access F1 F2 F3 The organization is looking to merge the ranges. Which ones cannot and which ones can be merged? Specify the rights of the two subjects above, S1 and S2, to documents in the new range. computer science
Answers
Answered by
0
Answer:
I didn't know the answer
Answered by
0
Explanation:
Some MAC policies serve specific kinds of institutions by codifying best
practices that long preceded computerization.
Multi-level security policies, which supports a need-to-know principle for
accessing confidential information. Developed for use by the military,
diplomatic, and intelligence communities, multi-level security policies have
found application in other settings, as well as for protecting the integrity
of information.
Commercial security policies, which embody accounting practices to
protect against financial fraud by employees, customers, and/or partners.
Such policies enforce separation of duty and prevent incorrectly or
incompletely performed business processes
Similar questions