Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. (5 points) Assume a system enforces both the BLP and Biba properties. For BLP thatmeans read down/write up only and for Biba it means read up/write down only. Assumealso that two models use identical levels for both security and integritySL = security clearance for level L = integrity clearance for level LSC = security category set for cat. C = integrity category set for cat CProve that in this system a subject can only read and write at his own level
2.a. (2 points) In Lipner's model consider moving a program from development intoproduction. What are the starting and ending security and integrity levels of this object
2b. (1 point) Who in Lipner's model can make this change?
2c. (3 points) Explain the reads and writes necessary to make this change and justify theread and write using Lipner's matrix
3. (3 points) The Chinese Wall Model is about controlling data flow to avoid conflict ofinterest (COI). If company A and B are in the same COI class, a consultant can not workwith both clients as there might be sharing of information between A and B. Similarly, ifC and D are in a second COI class, a consultant can not work with both C and D as itmight lead to sharing of information between C and D. However, a consultant is allowedto work with companies from different COI classes, i.e., one company from COI 1 andone company from COI 2. Clearly if a consultant can read a file from company A, hecan't be allowed to write to a file from company B. What additional write restrictionneeds to be imposed to ensure there is no information flow within a COI class? Explainyour answer.
A
B
C
D
COI 1
Banks
COI 2
Utilities 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9651741

Have any Question?


Related Questions in Computer Engineering

Question review ram flash memory magnetic and optical

Question : Review RAM, Flash Memory, Magnetic and Optical storage technologies concerning their placement in the usage hierarchy of contemporary computer systems. Include size, speed and cost considerations at each level ...

Remote direct memory access rdma enables efficient memory

Remote Direct Memory Access (RDMA) enables efficient memory access from one computer to another. Read about it using Google Scholar, ACM Digital Library or any professional literature tools. Write a 150-200 words (refere ...

Question erd assignmentcreate a crows foot erd following

Question: ERD Assignment Create a Crow's foot ERD following the business rules for the ProdCo Company. 1. Each sales representative writes many invoices 2. Each invoice is written by one sales representative 3. Each sale ...

Why regulated industries should be required to follow

Why regulated industries should be required to follow security standards. Provide 2 examples of industries that would fall under this category.

A group of students made the following scores on a 10-item

A group of students made the following scores on a 10-item quiz in psychological statistics: {5, 6, 7, 7, 7, 8, 8, 9, 9, 10, 10} What is the variance, treating these scores as a sample?

How can deferred cancellation ensure that thread

How can deferred cancellation ensure that thread termination occurs in an orderly manner as compared to asynchronous cancellation?

How do i start off creating a computer program that manages

How do I start off creating a computer program that manages a to-do list? I am using Visual Studio C progamming. I have to create a menu-based system that manages tasks. here is the parameters.. That is, the Todo app man ...

Program in cit is often times advantageous to be able to

*Program in C* It is often times advantageous to be able to transfer data between two arrays. Need a help with program (transfer.c) that add a range (by start index and end index) of numbers from array #1 to array #2 at ...

Question suppose that you discover that ram addresses

Question : Suppose that you discover that RAM addresses 000C0000 to 000C7FFF are reserved for a PC's video adapter in a 32-bit computer. How many bytes of memory is this?

Subject digital securityprovide an fidm authentication

Subject : Digital Security Provide an FIdM authentication system that you have used (being subjet to). Tell the name of the organizations acted as the IdP (Identity Provider) and SP (Service Provider)?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As