Computer Science, asked by sanjaysuryawanshi097, 12 hours ago

Consider that there are three files in the following ranges (R1, R2, R3): File F1: [(Unclassified,{C0,C1}), (Confidential,{C0,C1,C3})] – R1 File F2: [(Confidential,{C1,C2}), (Secret,{C0,C1,C2,C3})] – R2 File F3: [(Secret,{C1,C2,C3}), (Top Secret,{C0,C1,C2,C3})] – R3 Subject S1 has the classification (Secret,{C0,C1,C2,C3,C4}). Which files can he access and how ( Fill in the table)? Justify your answer. File Access F1 F2 F3 Subject S2 has the classification (Top Secret,{C0,C1,C2,C3}). Which files can he access and how ( Fill in the table)? Justify your answer. File Access F1 F2 F3 The organization is looking to merge the ranges. Which ones cannot and which ones can be merged? Specify the rights of the two subjects above, S1 and S2, to documents in the new range. computer science​

Answers

Answered by dattakendre4332
0

Answer:

I didn't know the answer

Answered by shilpa85475
0

Explanation:

Some MAC policies serve specific kinds of institutions by codifying best

practices that long preceded computerization.  

Multi-level security policies, which supports a need-to-know principle for

accessing confidential information. Developed for use by the military,

diplomatic, and intelligence communities, multi-level security policies have

found application in other settings, as well as for protecting the  integrity

of information.

Commercial security policies, which embody accounting practices to

protect against financial fraud by employees, customers, and/or partners.

Such policies enforce separation of duty and prevent incorrectly or

incompletely performed business processes

Similar questions