16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Managing Access 297<br />

of the session and those of the files accessed during the session are used, in<br />

turn, to label output from the session. This ensures that information is uniformly<br />

protected throughout its life on the system.<br />

<strong>Security</strong> labels are a very strong form of access control. Because they are costly and<br />

difficult to administer, security labels are best suited for information systems that<br />

have very strict security requirements (such as that used by government, financial, and<br />

research and development [R & D] organizations that handle classified information or<br />

information whose loss would severely or critically degrade the financial viability of the<br />

organization). <strong>Security</strong> labels are an excellent means of consistent enforcement of access<br />

restrictions; however, their administration and highly inflexible characteristics can be a<br />

significant deterrent to their use.<br />

<strong>Security</strong> labels cannot generally be changed because they are permanently linked to<br />

specific information. For this reason, user-accessible data cannot be disclosed as a result<br />

of a user copying information and changing the access rights on a file in an attempt to<br />

make that information more accessible than the document owner originally intended.<br />

This feature eliminates most types of human errors and malicious software problems<br />

that compromise data. The drawback to using security labels is that sometimes the very<br />

feature that protects user data also prevents legitimate use of some information. As an<br />

example, it is impossible to cut and paste information from documents with different<br />

access levels assigned to their respective labels.<br />

13.1.5.2 Data Categorization<br />

One method used to ease the burden necessary for administration of security labeling<br />

is categorizing data by similar protection requirements (data categorization). As an<br />

example, a label could be developed specifically for “ Company Proprietary Data. ” This<br />

label would mark information that can be disclosed only to the organization’s employees.<br />

Another label, “ General Release Data, ” could be used to mark information that is<br />

available to anyone.<br />

When considering the implementation of mandatory access controls with security labels,<br />

one must decide between using a rule-based approach, where access is granted based on<br />

resource rules, or using an administratively directed approach, where access is granted<br />

by an administrator who oversees the resources. Using a rule-based approach is most<br />

often preferred because members of a group can be granted access simply by validating<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!