Two questions if anyone ever comes here:<br>
<br>
1. I need to invoke object level security at a site running Irix 6.5 and Linux 5.2. Is there a way?<br>
<br>
2. What is B2 security? I've heard of C2.
B2 is an orangebook TCSEC rating . A rating at the B level indicates support for mandatory access control as well as a relatively high level of security assurance (No discressionary access allowed).<br>
<br>
Unfortunately i'm not sure about your first question. I'm tempted to say no, with the current embedded tools, especially from SGI. I'll see what I can dig up though.
I've noticed that high end security questions just don't get asked here. I think that specific questions related to security have been asked in the forums that involve specific products...
Warmongr....I'll put in my two cents....<br>
<br>
There are basically four divisions of security, from D (the lowest protection) to A (good protection). Within these divisions you will find seven levels though, and each level includes all of the security provisions of the proceeding levels, so that as you can see, levels build upon each other. So in answer to your question, B2 security is simply a level of security a step greater than B1, and A1 is greater than all the other levels. These are simply, as Warcorp points out, orangebook ratings. <br>
<br>
Unfortunately, Warcorp's suspicions are also correct, that the answer is NO to object level security. Your platforms do not follow a physical security model, but rather a discretionary access model. Here the owner of an object controls access to the object for himself, a group, and all others. The owner can do anything with the object, and therefore security is discretionary, and therefore..limited.
The term "object". Does it refer to any item that is loaded in memory ? Clarify if you can please.<br>
<br>
war...<br>
<br>
thanks. please deposit two more cents.!
In system security terms, two stand out alot...subject and object. Subjects are basically either persons OR programs that operate on behalf of other users. Objects though, are not active, but passive things.....such as any files, devices, and really even the system itself. So if you want to read a file on the system using a text editor called, "wordy", for example..hehe..bad one too ;-)..."wordy" is the subject which will read from the file (which is the object). Speaking of wordy...darn if I aint too! ;-) Hope that clarifies terms a bit.
Thanks Cloudy,<br>
<br>
Clear as blue skies. You should change your handle to "CRYSYAL" as in the movie A FEW GOOD MEN.<br>
<br>
"Are we clear!!", Jack Nicholson<br>
"Crystal!", That young, arrogant dude.<br>
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.