prolog to lecture 3 cs 236 on line ms program networks
play

Prolog to Lecture 3 CS 236 On-Line MS Program Networks and Systems - PowerPoint PPT Presentation

Prolog to Lecture 3 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Lecture 3 Page 1 CS 236 Online Mandatory Access Control and the Real World For a long time, things like Bell-La Padula were hard to run


  1. Prolog to Lecture 3 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Lecture 3 Page 1 CS 236 Online

  2. Mandatory Access Control and the Real World • For a long time, things like Bell-La Padula were hard to run • Real-world commercial systems did not support them • That’s changing Lecture 3 Page 2 CS 236 Online

  3. SE Linux and Flask • Security Enhanced Linux – Developed by NSA researchers – Open source, like all Linux • Implementation of the Flask security architecture – Which allows flexible use of mandatory access control Lecture 3 Page 3 CS 236 Online

  4. What Can You Do With Flask? • Multi-level security – Including Bell La Padula • Domain Type Enforcement • Role-based Access Control • Many other types of mandatory access control policies • No superuser, many other common Linux/ Unix security problems avoided Lecture 3 Page 4 CS 236 Online

  5. What Does This Mean For You? • You can get usable, commercial operating systems with MAC • Even operating systems with strong industry support • Well, so what? Lecture 3 Page 5 CS 236 Online

  6. Is MAC For You? • MAC is only useful where it makes sense to force policy to be followed • Typically not on a single user’s personal machine • More common on industry installations – Especially those with military connections • Do you need to guarantee access control properties? – Regardless of how foolish your users are? Lecture 3 Page 6 CS 236 Online

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend