Page 118 - DCAP516_COMPUTER_SECURITY
P. 118

Computer Security




                    Notes          7.  The ……………………………… was the first evaluation criteria developed to assess MLS
                                       in computer systems.
                                   8.  Sanitization is a problem area for …………………… systems.

                                   9.  ……………………. is problematic when introduced as a means to treat a system high
                                       object as if it were MLS trusted.
                                   10.  A common example of unavoidable bypass is a subject system that is required to accept
                                       secret IP packets from an ………………………………. source.

                                   9.5 Summary


                                       The DBMS can require rigorous user authentication.
                                       Databases amalgamate data from many sources, and users expect a DBMS to provide
                                       access to the data in a reliable way. Database concerns about reliability and integrity can
                                       be viewed from three dimensions: Database integrity, element integrity and element
                                       accuracy.
                                       Sensitive data are data that should not be made public. Several factors can make data
                                       sensitive.
                                       Database activity monitoring (DAM) is a database security technology for monitoring
                                       and analyzing database activity that operates independently of the database management
                                       system (DBMS) and does not rely on any form of native (DBMS-resident) auditing or
                                       native logs such as trace or transaction logs. DAM is typically performed continuously
                                       and in real-time.’
                                       Multilevel security or Multiple Levels of Security (abbreviated as MLS) is the application
                                       of a computer system to process information with different sensitivities (i.e., at different
                                       security levels), permit simultaneous access by users with different security clearances
                                       and needs-to-know, and prevent users from obtaining access to information for which
                                       they lack authorization.

                                       MLS allows easy access to less-sensitive information by higher-cleared individuals, and it
                                       allows higher-cleared individuals to easily share sanitized documents with less-cleared
                                       individuals. A sanitized document is one that has been edited to remove information that
                                       the less-cleared individual is not allowed to see.

                                       Sanitization is a problem area for MLS systems. Covert channels pose another problem
                                       for MLS systems. Bypass is problematic when introduced as a means to treat a system high
                                       object as if it were MLS trusted.

                                   9.6 Keywords

                                   Database Activity Monitoring: Database activity monitoring (DAM) is a database security
                                   technology for monitoring and analyzing database activity that operates independently of the
                                   database management system (DBMS) and does not rely on any form of native (DBMS-resident)
                                   auditing or native logs such as trace or transaction logs. DAM is typically performed continuously
                                   and in real-time.

                                   Database Integrity: It concern that the database as a whole is protected against damage, as from
                                   the failure of a disk drive or the corruption of the master database index.
                                   Element Accuracy: concern that only correct values are written into the elements of a database.

                                   Element Integrity: The integrity of database elements is their correctness or accuracy.



          112                               LOVELY PROFESSIONAL UNIVERSITY
   113   114   115   116   117   118   119   120   121   122   123