Page 118 - DCAP516_COMPUTER_SECURITY
P. 118
Computer Security
Notes 7. The ……………………………… was the first evaluation criteria developed to assess MLS
in computer systems.
8. Sanitization is a problem area for …………………… systems.
9. ……………………. is problematic when introduced as a means to treat a system high
object as if it were MLS trusted.
10. A common example of unavoidable bypass is a subject system that is required to accept
secret IP packets from an ………………………………. source.
9.5 Summary
The DBMS can require rigorous user authentication.
Databases amalgamate data from many sources, and users expect a DBMS to provide
access to the data in a reliable way. Database concerns about reliability and integrity can
be viewed from three dimensions: Database integrity, element integrity and element
accuracy.
Sensitive data are data that should not be made public. Several factors can make data
sensitive.
Database activity monitoring (DAM) is a database security technology for monitoring
and analyzing database activity that operates independently of the database management
system (DBMS) and does not rely on any form of native (DBMS-resident) auditing or
native logs such as trace or transaction logs. DAM is typically performed continuously
and in real-time.’
Multilevel security or Multiple Levels of Security (abbreviated as MLS) is the application
of a computer system to process information with different sensitivities (i.e., at different
security levels), permit simultaneous access by users with different security clearances
and needs-to-know, and prevent users from obtaining access to information for which
they lack authorization.
MLS allows easy access to less-sensitive information by higher-cleared individuals, and it
allows higher-cleared individuals to easily share sanitized documents with less-cleared
individuals. A sanitized document is one that has been edited to remove information that
the less-cleared individual is not allowed to see.
Sanitization is a problem area for MLS systems. Covert channels pose another problem
for MLS systems. Bypass is problematic when introduced as a means to treat a system high
object as if it were MLS trusted.
9.6 Keywords
Database Activity Monitoring: Database activity monitoring (DAM) is a database security
technology for monitoring and analyzing database activity that operates independently of the
database management system (DBMS) and does not rely on any form of native (DBMS-resident)
auditing or native logs such as trace or transaction logs. DAM is typically performed continuously
and in real-time.
Database Integrity: It concern that the database as a whole is protected against damage, as from
the failure of a disk drive or the corruption of the master database index.
Element Accuracy: concern that only correct values are written into the elements of a database.
Element Integrity: The integrity of database elements is their correctness or accuracy.
112 LOVELY PROFESSIONAL UNIVERSITY