CISP-信息安全模型讲稿精品课件.ppt

上传人(卖家):三亚风情 文档编号:3376722 上传时间:2022-08-25 格式:PPT 页数:54 大小:918KB
下载 相关 举报
CISP-信息安全模型讲稿精品课件.ppt_第1页
第1页 / 共54页
CISP-信息安全模型讲稿精品课件.ppt_第2页
第2页 / 共54页
CISP-信息安全模型讲稿精品课件.ppt_第3页
第3页 / 共54页
CISP-信息安全模型讲稿精品课件.ppt_第4页
第4页 / 共54页
CISP-信息安全模型讲稿精品课件.ppt_第5页
第5页 / 共54页
点击查看更多>>
资源描述

1、机密性访问控制信息流DAC自主MAC强制完整性RBACBLPChinese Wall(非干扰性,非观察性)BibaClark-Wilsonthe“Chinese Wall”Policy is a mandatory access control policy for stock market analysts.This organizational policy is legally binding in the United Kingdom stock exchange.Ln HiHn HiHn LiLn Li RBAC3RBAC1 RBAC2 RBAC010 NON-REVERSIBLE

2、ACTIONS11 REDUNDANCY12 MINIMIZATION.Variable Minimization Data Minimization Target Value Minimization Access Time MinimizationRule 1.The system will have an IVP for validating the integrity of any CDI.In Windows NT there is a local security authority(LSA)which checks the security information in the

3、subjects access token with the security information in the objects security descriptorRule 2.The application of a TP to any CDI must maintain the integrity of that CDIIn Windows NT,most subjects cannot change the attribution of the objects,but some subjects have this privilege,such as administrator

4、But this is only limited to some special users.So this rule is not applied to Windows NT strictlyRule 3.A CDI can only be changed by a TPAs mentioned above some special users can change attribution of the objects,and no other methods can be applied to change objectsRule 4.Subjects can only initiate

5、certain TPs on certain CDIsIn windows NT,the subjects access token includes what kinds of operations are permitted.Only when information of the access token is consistent with the information in the objects security descriptor,the operation is allowed C-W 模型的模型的NT解释解释 Rule 5.CW-triples must enforce

6、some appropriate separation of duty policy on subjects In Windows NT,administrator can do anything.So this rule is not appliedRule 6.Certain special TPs on UDIs can produce CDIs as outputIn Windows NT,users can change the object from without ACL state to with ACL state.Generally,this operation is pe

7、rformed by AdministratorRule 7.Each TP application must cause information sufficient to reconstruct the application to be written to a special append-only CDIIn Windows NT,audit services can collect information about how the system is being usedRule 8.The system must authenticate subjects attempting

8、 to initiate a TPIn Windows NT,any user has her or his SID,and any process in behalf of this user copies the same SID.By this way,Windows NT can authenticate subjects attempting to initial a TPRule 9.The system must only permit special subjects(i.e.,security officers)to make any authorization-related lists.In Windows NT,only administrator can do and view some high security events

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 办公、行业 > 各类PPT课件(模板)
版权提示 | 免责声明

1,本文(CISP-信息安全模型讲稿精品课件.ppt)为本站会员(三亚风情)主动上传,163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
2,用户下载本文档,所消耗的文币(积分)将全额增加到上传者的账号。
3, 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(发送邮件至3464097650@qq.com或直接QQ联系客服),我们立即给予删除!


侵权处理QQ:3464097650--上传资料QQ:3464097650

【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。


163文库-Www.163Wenku.Com |网站地图|