Question

Analyze the datagram to determine the source and destination IP addresses and ports. Source IP =...

  1. Analyze the datagram to determine the source and destination IP addresses and ports.

Source IP =

Source Port =

Destination IP=

Destination port =


  1. Compare and contrast Mandatory Access Control, Discretionary Access Control, and Role Based Access Control. Students must go into depth to receive credit for this.

Homework Answers

Answer #1

Compare and contrast Mandatory Access Control, Discretionary Access Control, and Role Based Access Control. Students must go into depth to receive credit for this.

Discretionary Access Control

In discretionary access control (DAC), the owner of the object specifies which subjects can access the object. This model is called discretionary because the control of access is based on the discretion of the owner.

Most operating systems such as all Windows, Linux, and Macintosh and most flavors of Unix are based on DAC models.

In these operating systems, when you create a file, you decide what access privileges you want to give to other users; when they access your file, the operating system will make the access control decision based on the access privileges you created.

Pros

  • User-friendly — Users can manage their data and quickly access data of other users.
  • Flexible — Users can configure data access parameters without administrators.
  • Easy to maintain — Adding new objects and users doesn’t take much time for the administrator.
  • Granular — Users can configure access parameters for each piece of data.

Cons

  • Low level of data protection — DAC can’t ensure reliable security because users can share their data however they like.
  • Obscure — There’s no centralized access management, so in order to find out access parameters, you have to check each ACL.

Mandatory Access Control

In mandatory access control (MAC), the system (and not the users) specifies which subjects can access specific data objects.

The MAC model is based on security labels. Subjects are given a security clearance (secret, top secret, confidential, etc.), and data objects are given a security classification (secret, top secret, confidential, etc.). The clearance and classification data are stored in the security labels, which are bound to the specific subjects and objects.

When the system is making an access control decision, it tries to match the clearance of the subject with the classification of the object. For example, if a user has a security clearance of secret, and he requests a data object with a security classification of top secret, then the user will be denied access because his clearance is lower than the classification of the object.

The MAC model is usually used in environments where confidentiality is of utmost importance, such as a military institution.

Examples of the MAC-based commercial systems are SE Linux and Trusted Solaris.

Pros and cons of MAC

Pros

  • High level of data protection — An administrator defines access to objects, and users can’t edit that access.
  • Granular — An administrator sets user access rights and object access parameters manually.
  • Immune to Trojan Horse attacks — Users can’t declassify data or share access to classified data.

Cons

  • Maintainability — Manual configuration of security levels and clearances requires constant attention from administrators.
  • Scalability — MAC doesn’t scale automatically.
  • Not user-friendly — Users have to request access to each new piece of data; they can’t configure access parameters for their own data

Role Based Access Control

Role Based Access Control (RBAC), also known as Non discretionary Access Control, takes more of a real world approach to structuring access control. Access under RBAC is based on a user's job function within the organization to which the computer system belongs.

Essentially, RBAC assigns permissions to particular roles in an organization. Users are then assigned to that particular role. For example, an accountant in a company will be assigned to the Accountant role, gaining access to all the resources permitted for all accountants on the system. Similarly, a software engineer might be assigned to the developer role.

Roles differ from groups in that while users may belong to multiple groups, a user under RBAC may only be assigned a single role in an organization. Additionally, there is no way to provide individual users additional permissions over and above those available for their role. The accountant described above gets the same permissions as all other accountants, nothing more and nothing less.

Refer,

https://www.govinfo.gov/content/pkg/GOVPUB-C13-c259b09b0a792f1b4ec649f11a1d62f8/pdf/GOVPUB-C13-c259b09b0a792f1b4ec649f11a1d62f8.pdf

for more detailed study, it helps a lot!

Analyze the datagram to determine the source and destination IP addresses and ports.

Source IP =

Source Port =

Destination IP=

Destination port =

Datagram is not provided, please make sure that you furnish as other question in case if you need the solution!

Hope it helps you! :-)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Item 1 In the case below, the original source material is given along with a sample...
Item 1 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version Major changes within organizations are usually initiated by those who are in power. Such decision-makers sponsor the change and then appoint someone else - perhaps the director of training - to be responsible for implementing and managing change. Whether the appointed change agent is in...
Item 1 In the case below, the original source material is given along with a sample...
Item 1 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version In contrast to the transmittal model illustrated by the classroom lecture-note taking scenario, the constructivist model places students at the center of the process--actively participating in thinking and discussing ideas while making meaning for themselves. And the professor, instead of being the "sage on the...
Reflect back on your draft. Reread it. Analyze it. What are the strengths of your draft?...
Reflect back on your draft. Reread it. Analyze it. What are the strengths of your draft? What areas will need improvement? The Treatment of Special Needs Children Abstract            Special needs children are still on the receiving end of abuse despite the increased clamor against their mistreatment. Also, they are likely to face discrimination and abuse in their homes and their social spheres; they have limited opportunities for quality education and can find trouble getting adequate medical assistance. The management of...
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
The Business Case for Agility “The battle is not always to the strongest, nor the race...
The Business Case for Agility “The battle is not always to the strongest, nor the race to the swiftest, but that’s the way to bet ’em!”  —C. Morgan Cofer In This Chapter This chapter discusses the business case for Agility, presenting six benefits for teams and the enterprise. It also describes a financial model that shows why incremental development works. Takeaways Agility is not just about the team. There are product-management, project-management, and technical issues beyond the team’s control. Lean-Agile provides...
QUESTION 1 1. Brianna is trying to increase her chances of being promoted to vice president...
QUESTION 1 1. Brianna is trying to increase her chances of being promoted to vice president by working to build good work relationships with other managers outside her own department. Brianna's behavior should be viewed as dysfunctional politics. functional politics. coercive power. functional influence. 2 points QUESTION 2 1. The Gingerbread Factory has a separate unit that makes their chocolate crunch cookies and another unit that is completely responsible for all operations in producing their ginger snap cookies. The Gingerbread...
Sign In INNOVATION Deep Change: How Operational Innovation Can Transform Your Company by Michael Hammer From...
Sign In INNOVATION Deep Change: How Operational Innovation Can Transform Your Company by Michael Hammer From the April 2004 Issue Save Share 8.95 In 1991, Progressive Insurance, an automobile insurer based in Mayfield Village, Ohio, had approximately $1.3 billion in sales. By 2002, that figure had grown to $9.5 billion. What fashionable strategies did Progressive employ to achieve sevenfold growth in just over a decade? Was it positioned in a high-growth industry? Hardly. Auto insurance is a mature, 100-year-old industry...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how the firms resources incompetencies support the given pressures regarding costs and local responsiveness. Describe entry modes have they usually used, and whether they are appropriate for the given strategy. Any key issues in their global strategy? casestudy: Atlanta, June 17, 2014. Sea of Delta employees and their families swarmed between food trucks, amusement park booths, and entertainment venues that were scattered throughout what would...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT