Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Management Expert

Please paraphrase the below

Types of Insiders

Differences among users may involve physical presence and logical presence. For example, there may be logical insiders who operationally are physically outside, and physical insiders who are logically outside. For present purposes, we consider both logical and physical insiders.

Clearly there are different degrees of logical insiders, relative to the nature of the systems and networks involved, the extent to which authentication and authorization are enforced, and the exact environment in which a user is operating at the moment. A user in one operational domain may be an insider at one moment and an outsider otherwise, with respect to each of the various so-called contexts noted above.

For example, if a system supports multilevel security (or multilevel integrity [1]), or even some form of multilevel availability or multilevel survivability [12]), then the existence of compartments suggests that a user can be an insider in one com- partment but an outsider in another compartment, or an insider at Top Secret but an outsider with respect to all compartments. In that a user may operate at different lev- els and compartments at different times, the concept of insider is both temporal and spatial. In some sense, all users of a single-level Top-Secret system could be called insiders with respect to confidentiality, although they would appear to be outsiders relative to those others who were cleared into a particular Top Secret compartment. Similarly, a user could be an insider with respect to multilevel security and an out- sider with repect to multilevel integrity. Thus, everything is relative to the frame of reference - what the user is trusted to be able to do, what privileges are required, what data or programs are being referenced, and whether the user authentication is strong enough to ensure that user identities are not spoofed.

With respect to conventional operating systems, database management systems, and applications functioning as single-level systems (even if lumping multilevel in-

formation into a single level, typically called system high), there are typically ordi- nary insiders who have passed the login authentication requirements and have been granted certain limited access rights. In addition, there are special users who are authorized to act as a superuser or otherwise be allocated extra-powerful privileges. In contrast, Trusted Xenix [7]) was a system in which the superuser privileges were extensively partitioned, where no one user holds all of the privileges, and where the granted privileges are insufficient to gain possession of all other privileges. (The it- erative closure of static privileges augmented by privilege-changing privileges must also be considered whenever we consider what privileges are actually attainable by a given user or group of collaborating users.) In that rather ideal case, we might have no complete insiders, but many different types of relative insiders. Unfortunately, in the absence of meaningfully secure systems and fine-grained access controls that are properly defined, properly implemented, and properly administered, that ideal is still a fantasy.

Thus, we are confronted with a wide variety of insiders that is inherently mul- tidimensional. Here, we tend to consider insiders somewhat loosely, avoiding fine nuances among different kinds of insiders. We assume that relative to a particular computational framework, insiders are users who have been authenticated to oper- ate within that framework. However, where appropriate, we qualify that to include reference to the authorized privileges that may be specifically associated with a par- ticular instance of an authenticated user (such as a system administrator).

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M92776210
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Business Management

Most ceos are aware of cyber risk and understand the need

Most CEOs are aware of cyber risk and understand the need for serious protection of their network systems. Do you agree?

Define budgeting and describe its primary purposes and

Define budgeting and describe its primary purposes and benefits to an organization.

How would you assign a primary key in a table also explain

How would you assign a Primary key in a table? Also, explain for each type of connectivity (1:1, 1:M and M:N), how would you assign a Foreign key?

What are the most important societal and workplace trends

What are the most important societal and workplace trends affecting the role of human resources currently?

What are key factors that must be planned prior to arriving

What are key factors that must be planned prior to arriving to the contingency location?

What is an example of corporation that uses information

What is an example of corporation that uses Information technologies to improve their decision making other than Verizon's web-based digital dash baords

Why is it important to consult on whs issues including

Why is it important to consult on WHS issues, including health and safety risks? what makes a consultation process effective

How can i find charts that show total cost and output

How can I find charts that show total cost and output relationship for companies with high fixed low variable cost and for companies with low fixed and high variable cost

Collaborative project looking closely at annual reports obj

Collaborative Project: Looking Closely at Annual Reports (Obj. 1) Team Project YOUR TASK. In teams of three or four, collect several corporate annual reports. For the apple annual report of 2016, identify and discuss the ...

What is a concrete example that demonstrates the

What is a concrete example that demonstrates the relationship between objectives and goals?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As