Saturday 14 January 2012

network security(3)


3. Access Control

January-2004 [12]

3.
a)         Explain briefly about Mandatory Access Control and Discretionary Access Control.
                                                                                                                                            [6]
b)         Describe briefly the Bell-La Padula model and its limitations.                                         [6]

July-2004 [11]

1.
e)         What are access control lists and capability lists? In what ways they differ in their organization?                                                                                                              [4]
2.
c)         Discuss no read up and no write down security policies and the tranquility principle in Bell – La Padula security model.                                                                                             [7]

 

January-2005 [4]

1.
b)         With respect to an operating system, what is the primary security benefit of access control lists?                                                                                                            [4]

 

July-2005 [6]

4.
a)         Explain briefly about Mandatory Access Control and Discretionary Access Control.       [6]

 

January-2006 [11]

2.
c)         What is the importance of "no read up" plus "no write down" rule for a multilevel security system?                                                                                                            [3]
6.
a)         Describe briefly the Bell-La Padula Model and its limitations. What is tranquility principle in this model?                                                                                                               [8]

July-2006 [0]


January-2007 [6]

6.
c)         Why are each initiator and each target assigned to one or more security groups in an access control scheme based on security labels?                                                         [6]

 

July-2007 [7]

1.
a)         What is access control? Differentiate between discretionary or mandatory access control techniques.                                                                                                                  [4]
7.
a)         Mandatory Access Control (MAC) is an access policy determined by the system, not the owner. Is it true or false? Justify.                                                                      [3]

January-2008 [4]

1.
a)         What do you understand by mandatory (non-discretionary) access control? What are the mandatory access control rules?                                                                                   [4]

 
 
July-2008 [12]
1.
c)         Mandatory access control (MAC) is an access policy determined by the system, not the owner. Is it true or false? Justify.              [4]

4.
a)         What is access control method? Explain the following access control model:
i) Bell-La Padula Model
ii) Biba Integrity Model                [8]

January-2009 [6]

2.
a)         Explain how NFTS permissions are better than share permissions.        [6]

July-2009 [15]
4.
a)         What do you understand by Access Control List? Briefly explain discretionary and mandatory access control.          [6]

7.
b)         Describe briefly the Bell-La Padula Model and its limitations. What is tranquility principle in this model?        [9]

January-2010 [8]

5.
b)         Write the formal definition of Role based access model. What are the advantages of using Role based control over Mandatory access control (MAC) and Discretionary access control (DAC)?                        [8]

July-2010 [0]


No comments:

Post a Comment