Global Information Lookup Global Information

Multi categories security information


Multi categories security (MCS) is an access control method in Security-Enhanced Linux that uses categories attached to objects (files) and granted to subjects (processes, ...) at the operating system level. The implementation in Fedora Core 5 is advisory because there is nothing stopping a process from increasing its access. The eventual aim is to make MCS a hierarchical mandatory access control system. Currently, MCS controls access to files and to ptrace or kill processes. The level of control MCS should have over access to directories and other file system objects has not yet been decided. [citation needed]

MCS access controls are applied after the Domain-Type access controls and after regular DAC (Unix permissions). In the default policy of Fedora Core 5, it is possible to manage up to 256 categories (c0 to c255). It is possible to recompile the policy with a much larger number of categories if required. [1]

As part of the Multi-Level Security (MLS) development work applications such as the CUPs print server will understand the MLS sensitivity labels, CUPs will use them to control printing and to label the printed pages according to their sensitivity level. The MCS data is stored and manipulated in the same way as MLS data, therefore any program which is modified for MCS support will also be expected to support MLS. This will increase the number of applications supporting MLS and therefore make it easier to run MLS (which is one of the reasons for developing MCS).

Note that MCS is not a sub-set of MLS, the Bell–LaPadula model is not applied. If a process has a clearance that dominates the classification of a file then it gets both read and write access. For example in a commercial environment you might use categories to map to data from different departments. So you could have c0 for HR data and c1 for Financial data. If a user is running with categories c0 and c1 then they can read HR data and write it to a file labeled for Financial data. In a corporate environment this is usually regarded as acceptable, if a user is trusted with both HR and Financial access then their integrity and skills are trusted to ensure that the data is not mistakenly released to the wrong file. For secret military data this is regarded as unacceptable and the Bell–LaPadula model prevents such accidental or malicious relabeling of data.

  1. ^ "Multi-Category Security in SELinux in Fedora Core 5 | Linux Journal". www.linuxjournal.com. Retrieved 2020-07-06.

and 20 Related for: Multi categories security information

Request time (Page generated in 0.8824 seconds.)

Multi categories security

Last Update:

Linux portal Multi categories security (MCS) is an access control method in Security-Enhanced Linux that uses categories attached to objects (files) and...

Word Count : 424

Multilevel security

Last Update:

control (MAC) Multi categories security (MCS) Multifactor authentication Non-interference (security) model Role-based access control (RBAC) Security modes of...

Word Count : 4178

MCS

Last Update:

Science Multiple Console Support, in OS/360 and successors Multi categories security, in Security-Enhanced Linux Multinational Character Set, used in VT220...

Word Count : 375

Computer security

Last Update:

following categories: A backdoor in a computer system, a cryptosystem, or an algorithm is any secret method of bypassing normal authentication or security controls...

Word Count : 22098

Type enforcement

Last Update:

for MAC, and a first step before multilevel security (MLS) or its replacement multi categories security (MCS). It is a complement of role-based access...

Word Count : 610

Central Industrial Security Force

Last Update:

Central Reserve Police Force Sashastra Seema Bal Security categories in India Assam Rifles National Security Guard Border outpost "Annual Report 2016-17"...

Word Count : 2571

Human security

Last Update:

national level. Human security reveals a people-centred and multi-disciplinary understanding of security which involves a number of research fields, including...

Word Count : 8795

Transport Layer Security

Last Update:

Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely...

Word Count : 17154

MultiCam

Last Update:

"French Army adopts new BME multi-environment combat uniform | Defense News May 2022 Global Security army industry | Defense Security global news industry army...

Word Count : 5492

Internet security

Last Update:

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies...

Word Count : 2588

Computer security model

Last Update:

access control (LBAC) Mandatory access control (MAC) Multi-level security (MLS) Non-interference (security) Object-capability model Protection ring Relationship-based...

Word Count : 184

System and Organization Controls

Last Update:

five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security: Security - information and systems...

Word Count : 1040

Hardware security module

Last Update:

A hardware security module (HSM) is a physical computing device that safeguards and manages secrets (most importantly digital keys), performs encryption...

Word Count : 2046

Border Security Force

Last Update:

The Border Security Force (BSF) is India's border guarding organisation at its borders with Pakistan and Bangladesh. It is one of the five Central Armed...

Word Count : 4277

Bitdefender

Last Update:

and virtualization security products. 2015: Bitdefender creates a new consumer product category with Bitdefender BOX and IoT security services. 2017: Bitdefender...

Word Count : 1279

National Security Agency

Last Update:

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National...

Word Count : 22341

Polar Security Cutter program

Last Update:

the medium icebreaker USCGC Healy, with three new multi-mission vessels referred to as Polar Security Cutters (PSC). These heavy polar icebreakers will...

Word Count : 1996

Cloud computing

Last Update:

processing Internet of things IoT security device Knowledge as a service Microservices Mobile cloud computing Multi-access edge computing Multisite cloud...

Word Count : 8002

Common Security and Defence Policy

Last Update:

The Common Security and Defence Policy (CSDP) is the European Union's (EU) course of action in the fields of defence and crisis management, and a main...

Word Count : 6280

Cloud computing security

Last Update:

types of controls behind a cloud security architecture, they can usually be found in one of the following categories: Deterrent controls These controls...

Word Count : 6676

PDF Search Engine © AllGlobal.net