Page 90 - DCAP516_COMPUTER_SECURITY
P. 90

Computer Security




                    Notes          1.  Mandatory Security Policy: Enforces access control rules based directly on an individual’s
                                       clearance, authorization for the information and the confidentiality level of the information
                                       being sought. Other indirect factors are physical and environmental. This policy must also
                                       accurately reflect the laws, general policies and other relevant guidance from which the
                                       rules are derived.
                                   2.  Marking: Systems designed to enforce a mandatory security policy must store and preserve
                                       the integrity of access control labels and retain the labels if the object is exported.

                                   3.  Discretionary Security Policy: Enforces a consistent set of rules for controlling and limiting
                                       access based on identified individuals who have been determined to have a need-to-know
                                       for the information.

                                   Accountability

                                   Individual accountability regardless of policy must be enforced. A secure means must exist to
                                   ensure the access of an authorized and competent agent which can then evaluate the accountability
                                   information within a reasonable amount of time and without undue difficulty. There are three
                                   requirements under the accountability objective:
                                   1.  Identification: The process used to recognize an individual user.

                                   2.  Authentication: The verification of an individual user’s authorization to specific categories
                                       of information.
                                   3.  Auditing: Audit information must be selectively kept and protected so that actions affecting
                                       security can be traced to the authenticated individual.

                                   Assurance

                                   The computer system must contain hardware/software mechanisms that can be independently
                                   evaluated to provide sufficient assurance that the system enforces the above requirements. By
                                   extension, assurance must include a guarantee that the trusted portion of the system works only
                                   as intended. To accomplish these objectives, two types of assurance are needed with their
                                   respective elements:
                                   1.  Assurance Mechanisms
                                   2.  Operational Assurance: System Architecture, System Integrity, Covert Channel Analysis,
                                       Trusted Facility Management and Trusted Recovery
                                   3.  Life-cycle Assurance: Security Testing, Design Specification and Verification, Configuration
                                       Management and Trusted System Distribution
                                   4.  Continuous Protection Assurance: The trusted mechanisms that enforce these basic
                                       requirements must be continuously protected against tampering and/or unauthorized
                                       changes.

                                   Documentation

                                   Within each class there is additional documentation set which addresses the development,
                                   deployment and management of the system rather than its capabilities. This documentation
                                   includes: Security Features User’s Guide, Trusted Facility Manual, Test Documentation and
                                   Design Documentation.








          84                                LOVELY PROFESSIONAL UNIVERSITY
   85   86   87   88   89   90   91   92   93   94   95