Page 280 - DCAP103_Principle of operating system
P. 280

Unit 8: System Protection



               •  Separation of Duty (SOD): The principle that no user should be given enough privileges to   Notes
                 misuse the system. For example, the person authorizing a paycheck should not also be the
                 one who can prepare it. Separation of duties can be enforced either statically by defining
                 conflicting  roles  (i.e.,  roles  which  cannot  be  executed  by  the  same  user)  or  dynamically
                 by enforcing the control at access time. An example of dynamic separation of duty is the
                 two-person rule. The first user to execute a two-person operation can be any authorized
                 user, whereas the second user can be any authorized user different from the first. There are
                 various types of SOD; an important one is a history-based SOD that regulates, for example,
                 the same subject (role) cannot access the same object for a certain number of times.
               •  Safety: Measures that the access control configuration (e.g., access control mechanism or
                 model) will not result in the leakage of permissions to an unauthorized principal. Thus,
                 a configuration is said to be safe if no permission can be leaked to an unauthorized or
                 unintended principal.
               •  Domain and Type Enforcement: The grouping of processes into domains, and objects into
                 types, such that access operations (such as read, write, execute, and create) are restricted
                 from domains to types and between domains. A process belongs to one domain at any
                 given time and transits to other domains by sending signals or executing a file in a new
                 domain.




                    Give the way of protection used in operating system.

            8.3.2 Policies, Models and Mechanisms
            When planning an access control system, three abstractions of controls should be considered—
            access  control  policies,  models,  and  mechanisms.  Access  control  policies  are  high-level
            requirements that specify how access is managed and who, under what circumstances, may
            access what information. While access control policies can be application-specific and thus taken
            into consideration by the application vendor, policies are just likely to pertain to user actions
            within the context of an organizational unit or across organizational boundaries. For instance,
            policies may pertain to resource usage within or across organizational units or may be based
            on need-to-know, competence, authority, obligation, or conflict-of-interest factors. Such policies
            may span multiple computing platforms and applications.
            At a high level, access control policies are enforced through a mechanism that translates a user’s
            access request, often in terms of a structure that a system provides. There are a wide variety of
            structures; for example, a simple table lookup can be performed to grant or deny access. Although
            no well-accepted standard yet exists for determining their policy support, some access control
            mechanisms are direct implementations of formal access control policy concepts.
            Rather than attempting to evaluate and analyze access control systems exclusively at the
            mechanism level, security models are usually written to describe the security properties of an
            access control system. A model is a formal presentation of the security policy enforced by the
            system and is useful for proving theoretical limitations of a system. Access control models are
            of general interest to both users and vendors. They bridge the rather wide gap in abstraction
            between policy and mechanism. Access control mechanisms can be designed to adhere to the
            properties of  the model.  Users  see  an access  control  model  as an unambiguous and  precise
            expression  of  requirements.  Vendors  and  system  developers  see  access  control  models  as
            design  and  implementation  requirements.  On  one  extreme,  an  access  control  model may  be
            rigid in its implementation of a single policy. On the other extreme, a security model will allow
            for the expression and enforcement of a wide variety of policies and policy classes. As stated
            previously,  the  focus  of  this  document  is  on  the  practical  side  of  the  access  control  system;
            detailed descriptions of access control models are not included in this publication.




                                             LOVELY PROFESSIONAL UNIVERSITY                                   273
   275   276   277   278   279   280   281   282   283   284   285