Security modes

Security modes

Generally, Security modes refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these systems contain information at various levels of security classification. The mode of operation is determined by:

  • The type of users who will be directly or indirectly accessing the system.
  • The type of data, including classification levels, compartments, and categories, that are processed on the system.
  • The type of levels of users, their need to know, and formal access approvals that the users will have.

Contents

Dedicated security mode

In this mode of operation, all users must have:

  • Signed NDA for ALL information on the system.
  • Proper clearance for ALL information on the system.
  • Formal access approval for ALL information on the system.
  • A valid need to know for ALL information on the system.

All users can access ALL data.

System high security mode

In this mode of operation, all users must have:

  • Signed NDA for ALL information on the system.
  • Proper clearance for ALL information on the system.
  • Formal access approval for ALL information on the system.
  • A valid need to know for SOME information on the system.

All users can access SOME data, based on their need to know.

Compartmented security mode

In this mode of operation, all users must have:

  • Signed NDA for ALL information on the system.
  • Proper clearance for ALL information on the system.
  • Formal access approval for SOME information they will access on the system.
  • A valid need to know for SOME information on the system.

All users can access SOME data, based on their need to know and formal access approval.

Multilevel security mode

In this mode of operation, all users must have:

  • Signed NDA for ALL information on the system.
  • Proper clearance for SOME information on the system.
  • Formal access approval for SOME information on the system.
  • A valid need to know for SOME information on the system.

All users can access SOME data, based on their need to know, clearance and formal access approval

Summary

Signed NDA for Proper clearance for Formal access approval for A valid need to know for
Dedicated security mode ALL information on the system. ALL information on the system. ALL information on the system. ALL information on the system.
System high security mode ALL information on the system ALL information on the system ALL information on the system SOME information on the system
Compartmented security mode ALL information on the system ALL information on the system SOME information on the system SOME information on the system
Multilevel security mode ALL information on the system SOME information on the system SOME information on the system SOME information on the system

See also

References

  • Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003.

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Security token — Several types of security tokens with a penny for scale …   Wikipedia

  • Multilevel security — or Multiple Levels of Security (abbreviated as MLS) is the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security… …   Wikipedia

  • Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… …   Wikipedia

  • Ring (computer security) — In computer science, hierarchical protection domains, [Paul A. Karger, Andrew J. Herbert, [http://doi.ieeecomputersociety.org/10.1109/SP.1984.10001 An Augmented Capability Architecture to Support Lattice Security and Traceability of Access] , sp …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • CPU modes — (also called processor modes or CPU privilege levels, and by other names) are operating modes for the central processing unit of some computer architectures that place restrictions on the operations that can be performed by the process currently… …   Wikipedia

  • Transportation Security Administration — Infobox Government agency agency name = Transportation Security Administration nativename = nativename a = nativename r = logo width = 200px logo caption = seal width = seal caption = formed = preceding1 = preceding2 = dissolved = superseding =… …   Wikipedia

  • Space Shuttle abort modes — A Space Shuttle abort is an emergency procedure due to equipment failure on NASA s Space Shuttle, most commonly during ascent. A main engine failure is a typical abort scenario. There are fewer abort options during reentry and descent. For… …   Wikipedia

  • Port security — refers to the defense, law and treaty enforcement, and counterterrorism activities that fall within the port and maritime domain. It includes the protection of the seaports themselves, the protection and inspection of the cargo moving through the …   Wikipedia

  • Encapsulated Security Payload Protocol — IPsec im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”