Knowee
Questions
Features
Study Tools

What term is used to describe a security policy where every subject and object is enforced to operate on mandatory access control?

Question

What term is used to describe a security policy where every subject and object is enforced to operate on mandatory access control?

🧐 Not the exact question you are looking for?Go ask a question

Solution

The term used to describe a security policy where every subject and object is enforced to operate on mandatory access control is "Lattice-Based Access Control" or LBAC.

Here are the steps to understand this:

  1. In computer security, access control includes mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC).

  2. Mandatory Access Control (MAC) is a strategy that assigns access rights based on rules defined by a central authority. It's often used in organizations that require a high level of security, like military institutions.

  3. In a MAC environment, access to system resources is controlled by the operating system (OS) based on settings provided by the system administrator.

  4. Lattice-Based Access Control (LBAC) is a type of MAC where every subject (user or process) and object (file or device) must have a set of access permissions that are strictly enforced.

  5. In LBAC, the system determines whether a subject can access an object based on their respective security levels and the lattice structure, which defines the permissible operations between different security levels.

  6. Therefore, in a security policy where every subject and object is enforced to operate on mandatory access control, the term used to describe this is "Lattice-Based Access Control" or LBAC.

This problem has been solved

Similar Questions

Explain the following terms in brief:i) Confidentialityii) Non-repudiationiii) Access Control.

means conforming to a , such as a specification, policy, standard or law. It is on , some else set the standard, generally delegated to the "safety person."

_____ ensures that information can only be obtained by authorized users. A. Integrity B. Confidentiality C. Availability D. Controllability

A part of a computer system or network which is designed to block unauthorized access while permitting outward communication..

_____________ refers to the violation of principle, if the system is no more accessible.*2 pointsConfidentialityAccess controlAvailabilityPassword

1/1

Upgrade your grade with Knowee

Get personalized homework help. Review tough concepts in more detail, or go deeper into your topic by exploring other relevant questions.