SlideShare a Scribd company logo
djlogo.jpg
Lecture #6: Multi-level Security
Dr.Ramchandra Mangrulkar, DJSCE Mumbai
August 13, 2020
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 1 / 24
djlogo.jpg
Security Model
What is your security policy?
What rules decide who gets access to your data?
Which entities governed by the policy?
What are the rules that constitute the policy?
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 2 / 24
djlogo.jpg
Security Model
What is your security policy?
What rules decide who gets access to your data?
Which entities governed by the policy?
What are the rules that constitute the policy?
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 2 / 24
djlogo.jpg
Security Model
What is your security policy?
What rules decide who gets access to your data?
Which entities governed by the policy?
What are the rules that constitute the policy?
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 2 / 24
djlogo.jpg
Security Model
What is your security policy?
What rules decide who gets access to your data?
Which entities governed by the policy?
What are the rules that constitute the policy?
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 2 / 24
djlogo.jpg
How do we define Policy
Security seems to mean something like “protection of assets against attack”
Security for a wireless phone system may be very different from security for a
military database system or an on-line banking system.
Security for a given system is defined in terms of a security policy, also
sometimes called a security model.
The policy is the system specification wrt security. It’s a contract between
the designer/implementor and the customer. Must be both achievable and
adequate for the intended uses.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 3 / 24
djlogo.jpg
How do we define Policy
Security seems to mean something like “protection of assets against attack”
Security for a wireless phone system may be very different from security for a
military database system or an on-line banking system.
Security for a given system is defined in terms of a security policy, also
sometimes called a security model.
The policy is the system specification wrt security. It’s a contract between
the designer/implementor and the customer. Must be both achievable and
adequate for the intended uses.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 3 / 24
djlogo.jpg
How do we define Policy
Security seems to mean something like “protection of assets against attack”
Security for a wireless phone system may be very different from security for a
military database system or an on-line banking system.
Security for a given system is defined in terms of a security policy, also
sometimes called a security model.
The policy is the system specification wrt security. It’s a contract between
the designer/implementor and the customer. Must be both achievable and
adequate for the intended uses.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 3 / 24
djlogo.jpg
How do we define Policy
Security seems to mean something like “protection of assets against attack”
Security for a wireless phone system may be very different from security for a
military database system or an on-line banking system.
Security for a given system is defined in terms of a security policy, also
sometimes called a security model.
The policy is the system specification wrt security. It’s a contract between
the designer/implementor and the customer. Must be both achievable and
adequate for the intended uses.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 3 / 24
djlogo.jpg
Multi-level Security
Figure: Multi-level Security 1
1Dieter-Gollmann-Wiley.Computer.Security.3rd.Edition
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 4 / 24
djlogo.jpg
Multi Level Security Model: The Institute Model
What is your security policy?
Ans: Role based model of Security.
What rules decide who gets access to your data?
Ans: defined according to policy.
Which entities governed by the policy?
Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching
Assistant, Student, Daily Wages Workers
What are the rules that constitute the policy?
Principal, HOD - Top Secret,
Faculty ,Office Staff- Secret
Teaching Assistant, Student-Confidential
Daily Wages Workers-Unclassified
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
djlogo.jpg
Multi Level Security Model: The Institute Model
What is your security policy?
Ans: Role based model of Security.
What rules decide who gets access to your data?
Ans: defined according to policy.
Which entities governed by the policy?
Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching
Assistant, Student, Daily Wages Workers
What are the rules that constitute the policy?
Principal, HOD - Top Secret,
Faculty ,Office Staff- Secret
Teaching Assistant, Student-Confidential
Daily Wages Workers-Unclassified
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
djlogo.jpg
Multi Level Security Model: The Institute Model
What is your security policy?
Ans: Role based model of Security.
What rules decide who gets access to your data?
Ans: defined according to policy.
Which entities governed by the policy?
Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching
Assistant, Student, Daily Wages Workers
What are the rules that constitute the policy?
Principal, HOD - Top Secret,
Faculty ,Office Staff- Secret
Teaching Assistant, Student-Confidential
Daily Wages Workers-Unclassified
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
djlogo.jpg
Multi Level Security Model: The Institute Model
What is your security policy?
Ans: Role based model of Security.
What rules decide who gets access to your data?
Ans: defined according to policy.
Which entities governed by the policy?
Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching
Assistant, Student, Daily Wages Workers
What are the rules that constitute the policy?
Principal, HOD - Top Secret,
Faculty ,Office Staff- Secret
Teaching Assistant, Student-Confidential
Daily Wages Workers-Unclassified
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
djlogo.jpg
Multi Level Security Model: The Institute Model
What is your security policy?
Ans: Role based model of Security.
What rules decide who gets access to your data?
Ans: defined according to policy.
Which entities governed by the policy?
Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching
Assistant, Student, Daily Wages Workers
What are the rules that constitute the policy?
Principal, HOD - Top Secret,
Faculty ,Office Staff- Secret
Teaching Assistant, Student-Confidential
Daily Wages Workers-Unclassified
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
djlogo.jpg
Multi Level Security Model: The Institute Model
What is your security policy?
Ans: Role based model of Security.
What rules decide who gets access to your data?
Ans: defined according to policy.
Which entities governed by the policy?
Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching
Assistant, Student, Daily Wages Workers
What are the rules that constitute the policy?
Principal, HOD - Top Secret,
Faculty ,Office Staff- Secret
Teaching Assistant, Student-Confidential
Daily Wages Workers-Unclassified
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
djlogo.jpg
Multi Level Security Model: The Institute Model
What is your security policy?
Ans: Role based model of Security.
What rules decide who gets access to your data?
Ans: defined according to policy.
Which entities governed by the policy?
Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching
Assistant, Student, Daily Wages Workers
What are the rules that constitute the policy?
Principal, HOD - Top Secret,
Faculty ,Office Staff- Secret
Teaching Assistant, Student-Confidential
Daily Wages Workers-Unclassified
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
djlogo.jpg
Multi Level Security Model: The Institute Model
What is your security policy?
Ans: Role based model of Security.
What rules decide who gets access to your data?
Ans: defined according to policy.
Which entities governed by the policy?
Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching
Assistant, Student, Daily Wages Workers
What are the rules that constitute the policy?
Principal, HOD - Top Secret,
Faculty ,Office Staff- Secret
Teaching Assistant, Student-Confidential
Daily Wages Workers-Unclassified
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
djlogo.jpg
Policy Document
Could be done informally in a natural language document
In practice, such documents too often suffer from ambiguities,
inconsistencies, and omissions.
To avoid these problems, Institute might prefer a formal statement of your
security policy.
A policy may be characterized informally, semi-formally, or formally.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 6 / 24
djlogo.jpg
Policy Document
Could be done informally in a natural language document
In practice, such documents too often suffer from ambiguities,
inconsistencies, and omissions.
To avoid these problems, Institute might prefer a formal statement of your
security policy.
A policy may be characterized informally, semi-formally, or formally.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 6 / 24
djlogo.jpg
Policy Document
Could be done informally in a natural language document
In practice, such documents too often suffer from ambiguities,
inconsistencies, and omissions.
To avoid these problems, Institute might prefer a formal statement of your
security policy.
A policy may be characterized informally, semi-formally, or formally.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 6 / 24
djlogo.jpg
Policy Document
Could be done informally in a natural language document
In practice, such documents too often suffer from ambiguities,
inconsistencies, and omissions.
To avoid these problems, Institute might prefer a formal statement of your
security policy.
A policy may be characterized informally, semi-formally, or formally.
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 6 / 24
djlogo.jpg
Policy Document
Metapolicy: The security goals in the most abstract sense
Policy: System-specific constraints intended to enforce the metapolicy
Faculty/staff may use student SAP numbers in documents/files/postings
All older docs containing SAP must be destroyed unless deemed necessary
Documents deemed necessary to retain must be kept in secure storage
SAP Number of Students/Staffs must be protected from disclosure
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
djlogo.jpg
Policy Document
Metapolicy: The security goals in the most abstract sense
Policy: System-specific constraints intended to enforce the metapolicy
Faculty/staff may use student SAP numbers in documents/files/postings
All older docs containing SAP must be destroyed unless deemed necessary
Documents deemed necessary to retain must be kept in secure storage
SAP Number of Students/Staffs must be protected from disclosure
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
djlogo.jpg
Policy Document
Metapolicy: The security goals in the most abstract sense
Policy: System-specific constraints intended to enforce the metapolicy
Faculty/staff may use student SAP numbers in documents/files/postings
All older docs containing SAP must be destroyed unless deemed necessary
Documents deemed necessary to retain must be kept in secure storage
SAP Number of Students/Staffs must be protected from disclosure
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
djlogo.jpg
Policy Document
Metapolicy: The security goals in the most abstract sense
Policy: System-specific constraints intended to enforce the metapolicy
Faculty/staff may use student SAP numbers in documents/files/postings
All older docs containing SAP must be destroyed unless deemed necessary
Documents deemed necessary to retain must be kept in secure storage
SAP Number of Students/Staffs must be protected from disclosure
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
djlogo.jpg
Policy Document
Metapolicy: The security goals in the most abstract sense
Policy: System-specific constraints intended to enforce the metapolicy
Faculty/staff may use student SAP numbers in documents/files/postings
All older docs containing SAP must be destroyed unless deemed necessary
Documents deemed necessary to retain must be kept in secure storage
SAP Number of Students/Staffs must be protected from disclosure
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
djlogo.jpg
Policy Document
Metapolicy: The security goals in the most abstract sense
Policy: System-specific constraints intended to enforce the metapolicy
Faculty/staff may use student SAP numbers in documents/files/postings
All older docs containing SAP must be destroyed unless deemed necessary
Documents deemed necessary to retain must be kept in secure storage
SAP Number of Students/Staffs must be protected from disclosure
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
djlogo.jpg
Secure System Design
How do you design a secure system?
What are you protecting and what are the potential threats? (risk
assessment)
What is the intuitive notion of security for such a system? (metapolicy)
What are appropriate security rules that attempt to capture this notion for
this system? (policy)
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 8 / 24
djlogo.jpg
Secure System Design
How do you design a secure system?
What are you protecting and what are the potential threats? (risk
assessment)
What is the intuitive notion of security for such a system? (metapolicy)
What are appropriate security rules that attempt to capture this notion for
this system? (policy)
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 8 / 24
djlogo.jpg
Secure System Design
How do you design a secure system?
What are you protecting and what are the potential threats? (risk
assessment)
What is the intuitive notion of security for such a system? (metapolicy)
What are appropriate security rules that attempt to capture this notion for
this system? (policy)
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 8 / 24
djlogo.jpg
Secure System Design
How do you design a secure system?
What are you protecting and what are the potential threats? (risk
assessment)
What is the intuitive notion of security for such a system? (metapolicy)
What are appropriate security rules that attempt to capture this notion for
this system? (policy)
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 8 / 24
djlogo.jpg
Secure System Design
What is an overall system architecture that supports our security goals?
(system design)
By what specific mechanisms might the security goals be accomplished?
(detailed design)
Does the system implementation accomplish the goal?
How certain can we be of our assessment?
Are there intuitively insecure behaviors that fall outside the range of the
policy?
Lots of other questions...
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
djlogo.jpg
Secure System Design
What is an overall system architecture that supports our security goals?
(system design)
By what specific mechanisms might the security goals be accomplished?
(detailed design)
Does the system implementation accomplish the goal?
How certain can we be of our assessment?
Are there intuitively insecure behaviors that fall outside the range of the
policy?
Lots of other questions...
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
djlogo.jpg
Secure System Design
What is an overall system architecture that supports our security goals?
(system design)
By what specific mechanisms might the security goals be accomplished?
(detailed design)
Does the system implementation accomplish the goal?
How certain can we be of our assessment?
Are there intuitively insecure behaviors that fall outside the range of the
policy?
Lots of other questions...
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
djlogo.jpg
Secure System Design
What is an overall system architecture that supports our security goals?
(system design)
By what specific mechanisms might the security goals be accomplished?
(detailed design)
Does the system implementation accomplish the goal?
How certain can we be of our assessment?
Are there intuitively insecure behaviors that fall outside the range of the
policy?
Lots of other questions...
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
djlogo.jpg
Secure System Design
What is an overall system architecture that supports our security goals?
(system design)
By what specific mechanisms might the security goals be accomplished?
(detailed design)
Does the system implementation accomplish the goal?
How certain can we be of our assessment?
Are there intuitively insecure behaviors that fall outside the range of the
policy?
Lots of other questions...
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
djlogo.jpg
Secure System Design
What is an overall system architecture that supports our security goals?
(system design)
By what specific mechanisms might the security goals be accomplished?
(detailed design)
Does the system implementation accomplish the goal?
How certain can we be of our assessment?
Are there intuitively insecure behaviors that fall outside the range of the
policy?
Lots of other questions...
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
djlogo.jpg
Multilevel Security Models
Bell La Padula Model
Biba Model
Chinese Wall Model
Clark-Wilson Model
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 10 / 24
djlogo.jpg
Multilevel Security Models
Bell La Padula Model
Biba Model
Chinese Wall Model
Clark-Wilson Model
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 10 / 24
djlogo.jpg
Multilevel Security Models
Bell La Padula Model
Biba Model
Chinese Wall Model
Clark-Wilson Model
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 10 / 24
djlogo.jpg
Multilevel Security Models
Bell La Padula Model
Biba Model
Chinese Wall Model
Clark-Wilson Model
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 10 / 24
djlogo.jpg
Bell LaPadula Model
David Bell, Len Lapadula
An abstract model intended to control information flow
Prevent unauthorized disclosure of information
Objects have a security level (e.g., unclassified, classified, secret, top secret)
Security levels are arranged in Linear order
Subjects (think: principals, processes) have a level
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
djlogo.jpg
Bell LaPadula Model
David Bell, Len Lapadula
An abstract model intended to control information flow
Prevent unauthorized disclosure of information
Objects have a security level (e.g., unclassified, classified, secret, top secret)
Security levels are arranged in Linear order
Subjects (think: principals, processes) have a level
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
djlogo.jpg
Bell LaPadula Model
David Bell, Len Lapadula
An abstract model intended to control information flow
Prevent unauthorized disclosure of information
Objects have a security level (e.g., unclassified, classified, secret, top secret)
Security levels are arranged in Linear order
Subjects (think: principals, processes) have a level
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
djlogo.jpg
Bell LaPadula Model
David Bell, Len Lapadula
An abstract model intended to control information flow
Prevent unauthorized disclosure of information
Objects have a security level (e.g., unclassified, classified, secret, top secret)
Security levels are arranged in Linear order
Subjects (think: principals, processes) have a level
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
djlogo.jpg
Bell LaPadula Model
David Bell, Len Lapadula
An abstract model intended to control information flow
Prevent unauthorized disclosure of information
Objects have a security level (e.g., unclassified, classified, secret, top secret)
Security levels are arranged in Linear order
Subjects (think: principals, processes) have a level
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
djlogo.jpg
Bell LaPadula Model
David Bell, Len Lapadula
An abstract model intended to control information flow
Prevent unauthorized disclosure of information
Objects have a security level (e.g., unclassified, classified, secret, top secret)
Security levels are arranged in Linear order
Subjects (think: principals, processes) have a level
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
djlogo.jpg
Bell La Padula Model for Institute
Security Level Subject Object
Top Secret Principal Personal Email
Secret Secretary Official Email
Confidential Office Assistant Personal Data(Drive), Official Data(PC)
Unclassified HOD, Faculty NAAC Data, NBA Data, AICTE Data
Table: Example: Simple Bell Lapdula Model
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 12 / 24
djlogo.jpg
Bell La Padula Model
Figure: Information Flow 2
Information Flow “UP”not “DOWN”
“No Read up”and “No Write Down”
2www.cs.utexas.edu/~byoung/cs361
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 13 / 24
djlogo.jpg
Bell La Padula Model
Figure: Information Flow 2
Information Flow “UP”not “DOWN”
“No Read up”and “No Write Down”
2www.cs.utexas.edu/~byoung/cs361
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 13 / 24
djlogo.jpg
Bell La Padula Model
Figure: Information Flow 2
Information Flow “UP”not “DOWN”
“No Read up”and “No Write Down”
2www.cs.utexas.edu/~byoung/cs361
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 13 / 24
djlogo.jpg
Dominates Relation
Figure: The Dominates Relation 3
3https://www.cs.utexas.edu/~byoung/cs361
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 14 / 24
djlogo.jpg
Partial Order
Figure: Partial Ordering 4
4https://www.cs.utexas.edu/~byoung/cs361
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 15 / 24
djlogo.jpg
Lattices
Algebraically, the (full) set of labels with their ordering would form a lattice.
This is sometimes called “lattice-based security.”
a lattice is a partially ordered set (or poset)
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 16 / 24
djlogo.jpg
Lattices
Algebraically, the (full) set of labels with their ordering would form a lattice.
This is sometimes called “lattice-based security.”
a lattice is a partially ordered set (or poset)
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 16 / 24
djlogo.jpg
Secure Reading
Suppose subject S with authorization (LS , CS ) asks to read an object O
with classification (LO, CO).
Under what conditions should the request be granted by the system?
For example, suppose a subject has clearance (Secret: Crypto).
Which of the following should he be able to read?
-document labeled (Confidential: Crypto)
-document labeled (Top Secret: Crypto)
-document labeled (Secret: Nuclear)
-document labeled (Secret: Crypto, Nuclear)
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 17 / 24
djlogo.jpg
Secure Reading
Suppose subject S with authorization (LS , CS ) asks to read an object O
with classification (LO, CO).
Under what conditions should the request be granted by the system?
For example, suppose a subject has clearance (Secret: Crypto).
Which of the following should he be able to read?
-document labeled (Confidential: Crypto)
-document labeled (Top Secret: Crypto)
-document labeled (Secret: Nuclear)
-document labeled (Secret: Crypto, Nuclear)
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 17 / 24
djlogo.jpg
Simple-Security Property
The Simple-Security Property:
Subject S with clearance (LS , CS ) may be granted read access to object O
with classification (LO, CO) only if (LS , CS ) dominates (LO, CO).
OR
Subject S with clearance (LS , CS ) may be granted read access to object O
with classification (LO, CO) only if (LS , CS )  (LO; CO):
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 18 / 24
djlogo.jpg
Simple-Security Property
The Simple-Security Property:
Subject S with clearance (LS , CS ) may be granted read access to object O
with classification (LO, CO) only if (LS , CS ) dominates (LO, CO).
OR
Subject S with clearance (LS , CS ) may be granted read access to object O
with classification (LO, CO) only if (LS , CS )  (LO; CO):
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 18 / 24
djlogo.jpg
Simple-Security Property
The Simple-Security Property:
Subject S with clearance (LS , CS ) may be granted read access to object O
with classification (LO, CO) only if (LS , CS ) dominates (LO, CO).
OR
Subject S with clearance (LS , CS ) may be granted read access to object O
with classification (LO, CO) only if (LS , CS )  (LO; CO):
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 18 / 24
djlogo.jpg
Figure: Reading Information 5
5http://nob.cs.ucdavis.edu/
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 19 / 24
djlogo.jpg
The *-Property
The *-Property: Subject S with clearance (LS , CS ) may be granted write
access to object O with classification (LO, CO)
only if (LS , CS )  (LO; CO):
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 20 / 24
djlogo.jpg
Figure: Writing Information 6
6http://nob.cs.ucdavis.edu/
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 21 / 24
djlogo.jpg
Bell Lapdula Model : No Read Up, No Write Down
Figure: Writing Information 7
7http://nob.cs.ucdavis.edu/
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 22 / 24
djlogo.jpg
Example
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 23 / 24
djlogo.jpg
Open Questions
Teaching assistant reading notes created by faculty.
Faculty members correcting assignments of students.
Faculty members correcting notes of Teaching Assistant.
AICTE Letter received by Principal is opened and read by HODs
HOD correcting applications made to Principal
Principal putting remarks on Students applications
Students correcting ppts made by Faculty
HODs writing remarks on AICTE files meant for Principal
HODs reading billing information submitted by Daily workers
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
djlogo.jpg
Open Questions
Teaching assistant reading notes created by faculty.
Faculty members correcting assignments of students.
Faculty members correcting notes of Teaching Assistant.
AICTE Letter received by Principal is opened and read by HODs
HOD correcting applications made to Principal
Principal putting remarks on Students applications
Students correcting ppts made by Faculty
HODs writing remarks on AICTE files meant for Principal
HODs reading billing information submitted by Daily workers
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
djlogo.jpg
Open Questions
Teaching assistant reading notes created by faculty.
Faculty members correcting assignments of students.
Faculty members correcting notes of Teaching Assistant.
AICTE Letter received by Principal is opened and read by HODs
HOD correcting applications made to Principal
Principal putting remarks on Students applications
Students correcting ppts made by Faculty
HODs writing remarks on AICTE files meant for Principal
HODs reading billing information submitted by Daily workers
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
djlogo.jpg
Open Questions
Teaching assistant reading notes created by faculty.
Faculty members correcting assignments of students.
Faculty members correcting notes of Teaching Assistant.
AICTE Letter received by Principal is opened and read by HODs
HOD correcting applications made to Principal
Principal putting remarks on Students applications
Students correcting ppts made by Faculty
HODs writing remarks on AICTE files meant for Principal
HODs reading billing information submitted by Daily workers
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
djlogo.jpg
Open Questions
Teaching assistant reading notes created by faculty.
Faculty members correcting assignments of students.
Faculty members correcting notes of Teaching Assistant.
AICTE Letter received by Principal is opened and read by HODs
HOD correcting applications made to Principal
Principal putting remarks on Students applications
Students correcting ppts made by Faculty
HODs writing remarks on AICTE files meant for Principal
HODs reading billing information submitted by Daily workers
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
djlogo.jpg
Open Questions
Teaching assistant reading notes created by faculty.
Faculty members correcting assignments of students.
Faculty members correcting notes of Teaching Assistant.
AICTE Letter received by Principal is opened and read by HODs
HOD correcting applications made to Principal
Principal putting remarks on Students applications
Students correcting ppts made by Faculty
HODs writing remarks on AICTE files meant for Principal
HODs reading billing information submitted by Daily workers
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
djlogo.jpg
Open Questions
Teaching assistant reading notes created by faculty.
Faculty members correcting assignments of students.
Faculty members correcting notes of Teaching Assistant.
AICTE Letter received by Principal is opened and read by HODs
HOD correcting applications made to Principal
Principal putting remarks on Students applications
Students correcting ppts made by Faculty
HODs writing remarks on AICTE files meant for Principal
HODs reading billing information submitted by Daily workers
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
djlogo.jpg
Open Questions
Teaching assistant reading notes created by faculty.
Faculty members correcting assignments of students.
Faculty members correcting notes of Teaching Assistant.
AICTE Letter received by Principal is opened and read by HODs
HOD correcting applications made to Principal
Principal putting remarks on Students applications
Students correcting ppts made by Faculty
HODs writing remarks on AICTE files meant for Principal
HODs reading billing information submitted by Daily workers
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
djlogo.jpg
Open Questions
Teaching assistant reading notes created by faculty.
Faculty members correcting assignments of students.
Faculty members correcting notes of Teaching Assistant.
AICTE Letter received by Principal is opened and read by HODs
HOD correcting applications made to Principal
Principal putting remarks on Students applications
Students correcting ppts made by Faculty
HODs writing remarks on AICTE files meant for Principal
HODs reading billing information submitted by Daily workers
Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24

More Related Content

PDF
Lecture #3: Defense Strategies and Techniques: Part II
PDF
Lecture #4: Access Control Policies
PDF
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
PDF
Lecture #2: Defence Strategies and Techniques (Security): Part I
PDF
Lecture #9 : Single Sign on and Federation Identity Management
PDF
Lecture #12,#13 : Program and OS Security -Part I
PPTX
Leverage Endpooint Visibilit with MITRE ATT&CK Framework
PDF
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
Lecture #3: Defense Strategies and Techniques: Part II
Lecture #4: Access Control Policies
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #12,#13 : Program and OS Security -Part I
Leverage Endpooint Visibilit with MITRE ATT&CK Framework
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?

What's hot (20)

PDF
OA_Cyber security course with AI
PPTX
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
PPTX
AI cybersecurity
PPTX
Product security by Blockchain, AI and Security Certs
PDF
Soc and siem and threat hunting
PPTX
Blackbox Testing in AI Cybersecurity
PPTX
AI and ML in Cybersecurity
PDF
AI for security or security for AI - Sergey Gordeychik
PDF
Machine Learning in Cyber Security Domain
PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
PDF
AI and Cybersecurity - Food for Thought
PDF
Challenges in Applying AI to Enterprise Cybersecurity
PPTX
Role of Forensic Triage In Cyber Security Trends 2021
PDF
Big Data Security Challenges: An Overview and Application of User Behavior An...
PDF
Guardians of the future what should we do to secure future cyberspace
PDF
How Machine Learning & AI Will Improve Cyber Security
PPTX
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
PPT
Malware analysis on android using supervised machine learning techniques
PDF
Application of Machine Learning in Cyber Security
PDF
Cyber Threat Intelligence - It's not just about the feeds
OA_Cyber security course with AI
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
AI cybersecurity
Product security by Blockchain, AI and Security Certs
Soc and siem and threat hunting
Blackbox Testing in AI Cybersecurity
AI and ML in Cybersecurity
AI for security or security for AI - Sergey Gordeychik
Machine Learning in Cyber Security Domain
Mark Arena - Cyber Threat Intelligence #uisgcon9
AI and Cybersecurity - Food for Thought
Challenges in Applying AI to Enterprise Cybersecurity
Role of Forensic Triage In Cyber Security Trends 2021
Big Data Security Challenges: An Overview and Application of User Behavior An...
Guardians of the future what should we do to secure future cyberspace
How Machine Learning & AI Will Improve Cyber Security
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
Malware analysis on android using supervised machine learning techniques
Application of Machine Learning in Cyber Security
Cyber Threat Intelligence - It's not just about the feeds
Ad

Similar to Lecture #6: Multilevel Security Models (20)

DOCX
Chapter 1Information Security OverviewCopyright © 2014 by Mc
PPTX
Need for Data Protection Training - How E-learning Can Help?
PDF
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
PPTX
Cybersecurity vs Data Science A Roadmap.pptx
PPTX
Cybersecurity vs Data Science A Roadmap.pptx
PDF
Top-Rated Professional Security Services for Comprehensive Protection.pdf
PDF
ICISS Newsletter Sept 14
PPTX
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PPTX
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
PDF
Security policy.pdf
DOCX
Advisory from Professionals Preparing Information .docx
DOCX
Advisory from Professionals Preparing Information .docx
PDF
Vulnerability Analyst interview Questions.pdf
PDF
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
PDF
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
PDF
Tech Talent Meetup Hacking Security Event Recap
PPT
BTCON 03 on security transformation
DOCX
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
DOCX
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Chapter 1Information Security OverviewCopyright © 2014 by Mc
Need for Data Protection Training - How E-learning Can Help?
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
Top-Rated Professional Security Services for Comprehensive Protection.pdf
ICISS Newsletter Sept 14
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
PACE-IT, Security+2.6: Security Related Awareness and Training
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Security policy.pdf
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
Vulnerability Analyst interview Questions.pdf
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Tech Talent Meetup Hacking Security Event Recap
BTCON 03 on security transformation
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Ad

More from Dr. Ramchandra Mangrulkar (20)

PDF
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
PDF
Introduction to Research and Publications Tools.pdf
PDF
Blockchain#2.pdf
PDF
Blockchain#1.pdf
PDF
Blockchain#3.pdf
PDF
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
PDF
Lecture #32: Forensic Duplication
PDF
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
PDF
LEcture #28-#30
PDF
Lecture #31 : Windows Forensics
PDF
Lecture #25 : Oauth 2.0
PDF
Lecture #24 : Cross Site Request Forgery (CSRF)
PDF
Lecture #22: Web Privacy & Security Breach
PDF
Lecture #22 : Web Privacy & Security Breach
PDF
Lecture #21: HTTPS , SSL & TLS
PDF
Lecture #18 - #20: Web Browser and Web Application Security
PDF
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
PDF
Lecture # 14: Salami and Linearization Attacks
PDF
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
PDF
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
Introduction to Research and Publications Tools.pdf
Blockchain#2.pdf
Blockchain#1.pdf
Blockchain#3.pdf
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Lecture #32: Forensic Duplication
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
LEcture #28-#30
Lecture #31 : Windows Forensics
Lecture #25 : Oauth 2.0
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #22: Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
Lecture #21: HTTPS , SSL & TLS
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture # 14: Salami and Linearization Attacks
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics

Recently uploaded (20)

PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Welding lecture in detail for understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
Project quality management in manufacturing
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
web development for engineering and engineering
PPTX
additive manufacturing of ss316l using mig welding
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Sustainable Sites - Green Building Construction
PPTX
Construction Project Organization Group 2.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Welding lecture in detail for understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Embodied AI: Ushering in the Next Era of Intelligent Systems
Project quality management in manufacturing
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
web development for engineering and engineering
additive manufacturing of ss316l using mig welding
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Internet of Things (IOT) - A guide to understanding
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
R24 SURVEYING LAB MANUAL for civil enggi
Mechanical Engineering MATERIALS Selection
Sustainable Sites - Green Building Construction
Construction Project Organization Group 2.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx

Lecture #6: Multilevel Security Models

  • 1. djlogo.jpg Lecture #6: Multi-level Security Dr.Ramchandra Mangrulkar, DJSCE Mumbai August 13, 2020 Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 1 / 24
  • 2. djlogo.jpg Security Model What is your security policy? What rules decide who gets access to your data? Which entities governed by the policy? What are the rules that constitute the policy? Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 2 / 24
  • 3. djlogo.jpg Security Model What is your security policy? What rules decide who gets access to your data? Which entities governed by the policy? What are the rules that constitute the policy? Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 2 / 24
  • 4. djlogo.jpg Security Model What is your security policy? What rules decide who gets access to your data? Which entities governed by the policy? What are the rules that constitute the policy? Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 2 / 24
  • 5. djlogo.jpg Security Model What is your security policy? What rules decide who gets access to your data? Which entities governed by the policy? What are the rules that constitute the policy? Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 2 / 24
  • 6. djlogo.jpg How do we define Policy Security seems to mean something like “protection of assets against attack” Security for a wireless phone system may be very different from security for a military database system or an on-line banking system. Security for a given system is defined in terms of a security policy, also sometimes called a security model. The policy is the system specification wrt security. It’s a contract between the designer/implementor and the customer. Must be both achievable and adequate for the intended uses. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 3 / 24
  • 7. djlogo.jpg How do we define Policy Security seems to mean something like “protection of assets against attack” Security for a wireless phone system may be very different from security for a military database system or an on-line banking system. Security for a given system is defined in terms of a security policy, also sometimes called a security model. The policy is the system specification wrt security. It’s a contract between the designer/implementor and the customer. Must be both achievable and adequate for the intended uses. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 3 / 24
  • 8. djlogo.jpg How do we define Policy Security seems to mean something like “protection of assets against attack” Security for a wireless phone system may be very different from security for a military database system or an on-line banking system. Security for a given system is defined in terms of a security policy, also sometimes called a security model. The policy is the system specification wrt security. It’s a contract between the designer/implementor and the customer. Must be both achievable and adequate for the intended uses. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 3 / 24
  • 9. djlogo.jpg How do we define Policy Security seems to mean something like “protection of assets against attack” Security for a wireless phone system may be very different from security for a military database system or an on-line banking system. Security for a given system is defined in terms of a security policy, also sometimes called a security model. The policy is the system specification wrt security. It’s a contract between the designer/implementor and the customer. Must be both achievable and adequate for the intended uses. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 3 / 24
  • 10. djlogo.jpg Multi-level Security Figure: Multi-level Security 1 1Dieter-Gollmann-Wiley.Computer.Security.3rd.Edition Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 4 / 24
  • 11. djlogo.jpg Multi Level Security Model: The Institute Model What is your security policy? Ans: Role based model of Security. What rules decide who gets access to your data? Ans: defined according to policy. Which entities governed by the policy? Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching Assistant, Student, Daily Wages Workers What are the rules that constitute the policy? Principal, HOD - Top Secret, Faculty ,Office Staff- Secret Teaching Assistant, Student-Confidential Daily Wages Workers-Unclassified Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
  • 12. djlogo.jpg Multi Level Security Model: The Institute Model What is your security policy? Ans: Role based model of Security. What rules decide who gets access to your data? Ans: defined according to policy. Which entities governed by the policy? Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching Assistant, Student, Daily Wages Workers What are the rules that constitute the policy? Principal, HOD - Top Secret, Faculty ,Office Staff- Secret Teaching Assistant, Student-Confidential Daily Wages Workers-Unclassified Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
  • 13. djlogo.jpg Multi Level Security Model: The Institute Model What is your security policy? Ans: Role based model of Security. What rules decide who gets access to your data? Ans: defined according to policy. Which entities governed by the policy? Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching Assistant, Student, Daily Wages Workers What are the rules that constitute the policy? Principal, HOD - Top Secret, Faculty ,Office Staff- Secret Teaching Assistant, Student-Confidential Daily Wages Workers-Unclassified Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
  • 14. djlogo.jpg Multi Level Security Model: The Institute Model What is your security policy? Ans: Role based model of Security. What rules decide who gets access to your data? Ans: defined according to policy. Which entities governed by the policy? Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching Assistant, Student, Daily Wages Workers What are the rules that constitute the policy? Principal, HOD - Top Secret, Faculty ,Office Staff- Secret Teaching Assistant, Student-Confidential Daily Wages Workers-Unclassified Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
  • 15. djlogo.jpg Multi Level Security Model: The Institute Model What is your security policy? Ans: Role based model of Security. What rules decide who gets access to your data? Ans: defined according to policy. Which entities governed by the policy? Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching Assistant, Student, Daily Wages Workers What are the rules that constitute the policy? Principal, HOD - Top Secret, Faculty ,Office Staff- Secret Teaching Assistant, Student-Confidential Daily Wages Workers-Unclassified Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
  • 16. djlogo.jpg Multi Level Security Model: The Institute Model What is your security policy? Ans: Role based model of Security. What rules decide who gets access to your data? Ans: defined according to policy. Which entities governed by the policy? Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching Assistant, Student, Daily Wages Workers What are the rules that constitute the policy? Principal, HOD - Top Secret, Faculty ,Office Staff- Secret Teaching Assistant, Student-Confidential Daily Wages Workers-Unclassified Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
  • 17. djlogo.jpg Multi Level Security Model: The Institute Model What is your security policy? Ans: Role based model of Security. What rules decide who gets access to your data? Ans: defined according to policy. Which entities governed by the policy? Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching Assistant, Student, Daily Wages Workers What are the rules that constitute the policy? Principal, HOD - Top Secret, Faculty ,Office Staff- Secret Teaching Assistant, Student-Confidential Daily Wages Workers-Unclassified Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
  • 18. djlogo.jpg Multi Level Security Model: The Institute Model What is your security policy? Ans: Role based model of Security. What rules decide who gets access to your data? Ans: defined according to policy. Which entities governed by the policy? Ans: Principal, Hod, Faculty, Non-Teaching, Office Persons, Teaching Assistant, Student, Daily Wages Workers What are the rules that constitute the policy? Principal, HOD - Top Secret, Faculty ,Office Staff- Secret Teaching Assistant, Student-Confidential Daily Wages Workers-Unclassified Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 5 / 24
  • 19. djlogo.jpg Policy Document Could be done informally in a natural language document In practice, such documents too often suffer from ambiguities, inconsistencies, and omissions. To avoid these problems, Institute might prefer a formal statement of your security policy. A policy may be characterized informally, semi-formally, or formally. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 6 / 24
  • 20. djlogo.jpg Policy Document Could be done informally in a natural language document In practice, such documents too often suffer from ambiguities, inconsistencies, and omissions. To avoid these problems, Institute might prefer a formal statement of your security policy. A policy may be characterized informally, semi-formally, or formally. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 6 / 24
  • 21. djlogo.jpg Policy Document Could be done informally in a natural language document In practice, such documents too often suffer from ambiguities, inconsistencies, and omissions. To avoid these problems, Institute might prefer a formal statement of your security policy. A policy may be characterized informally, semi-formally, or formally. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 6 / 24
  • 22. djlogo.jpg Policy Document Could be done informally in a natural language document In practice, such documents too often suffer from ambiguities, inconsistencies, and omissions. To avoid these problems, Institute might prefer a formal statement of your security policy. A policy may be characterized informally, semi-formally, or formally. Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 6 / 24
  • 23. djlogo.jpg Policy Document Metapolicy: The security goals in the most abstract sense Policy: System-specific constraints intended to enforce the metapolicy Faculty/staff may use student SAP numbers in documents/files/postings All older docs containing SAP must be destroyed unless deemed necessary Documents deemed necessary to retain must be kept in secure storage SAP Number of Students/Staffs must be protected from disclosure Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
  • 24. djlogo.jpg Policy Document Metapolicy: The security goals in the most abstract sense Policy: System-specific constraints intended to enforce the metapolicy Faculty/staff may use student SAP numbers in documents/files/postings All older docs containing SAP must be destroyed unless deemed necessary Documents deemed necessary to retain must be kept in secure storage SAP Number of Students/Staffs must be protected from disclosure Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
  • 25. djlogo.jpg Policy Document Metapolicy: The security goals in the most abstract sense Policy: System-specific constraints intended to enforce the metapolicy Faculty/staff may use student SAP numbers in documents/files/postings All older docs containing SAP must be destroyed unless deemed necessary Documents deemed necessary to retain must be kept in secure storage SAP Number of Students/Staffs must be protected from disclosure Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
  • 26. djlogo.jpg Policy Document Metapolicy: The security goals in the most abstract sense Policy: System-specific constraints intended to enforce the metapolicy Faculty/staff may use student SAP numbers in documents/files/postings All older docs containing SAP must be destroyed unless deemed necessary Documents deemed necessary to retain must be kept in secure storage SAP Number of Students/Staffs must be protected from disclosure Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
  • 27. djlogo.jpg Policy Document Metapolicy: The security goals in the most abstract sense Policy: System-specific constraints intended to enforce the metapolicy Faculty/staff may use student SAP numbers in documents/files/postings All older docs containing SAP must be destroyed unless deemed necessary Documents deemed necessary to retain must be kept in secure storage SAP Number of Students/Staffs must be protected from disclosure Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
  • 28. djlogo.jpg Policy Document Metapolicy: The security goals in the most abstract sense Policy: System-specific constraints intended to enforce the metapolicy Faculty/staff may use student SAP numbers in documents/files/postings All older docs containing SAP must be destroyed unless deemed necessary Documents deemed necessary to retain must be kept in secure storage SAP Number of Students/Staffs must be protected from disclosure Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 7 / 24
  • 29. djlogo.jpg Secure System Design How do you design a secure system? What are you protecting and what are the potential threats? (risk assessment) What is the intuitive notion of security for such a system? (metapolicy) What are appropriate security rules that attempt to capture this notion for this system? (policy) Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 8 / 24
  • 30. djlogo.jpg Secure System Design How do you design a secure system? What are you protecting and what are the potential threats? (risk assessment) What is the intuitive notion of security for such a system? (metapolicy) What are appropriate security rules that attempt to capture this notion for this system? (policy) Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 8 / 24
  • 31. djlogo.jpg Secure System Design How do you design a secure system? What are you protecting and what are the potential threats? (risk assessment) What is the intuitive notion of security for such a system? (metapolicy) What are appropriate security rules that attempt to capture this notion for this system? (policy) Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 8 / 24
  • 32. djlogo.jpg Secure System Design How do you design a secure system? What are you protecting and what are the potential threats? (risk assessment) What is the intuitive notion of security for such a system? (metapolicy) What are appropriate security rules that attempt to capture this notion for this system? (policy) Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 8 / 24
  • 33. djlogo.jpg Secure System Design What is an overall system architecture that supports our security goals? (system design) By what specific mechanisms might the security goals be accomplished? (detailed design) Does the system implementation accomplish the goal? How certain can we be of our assessment? Are there intuitively insecure behaviors that fall outside the range of the policy? Lots of other questions... Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
  • 34. djlogo.jpg Secure System Design What is an overall system architecture that supports our security goals? (system design) By what specific mechanisms might the security goals be accomplished? (detailed design) Does the system implementation accomplish the goal? How certain can we be of our assessment? Are there intuitively insecure behaviors that fall outside the range of the policy? Lots of other questions... Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
  • 35. djlogo.jpg Secure System Design What is an overall system architecture that supports our security goals? (system design) By what specific mechanisms might the security goals be accomplished? (detailed design) Does the system implementation accomplish the goal? How certain can we be of our assessment? Are there intuitively insecure behaviors that fall outside the range of the policy? Lots of other questions... Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
  • 36. djlogo.jpg Secure System Design What is an overall system architecture that supports our security goals? (system design) By what specific mechanisms might the security goals be accomplished? (detailed design) Does the system implementation accomplish the goal? How certain can we be of our assessment? Are there intuitively insecure behaviors that fall outside the range of the policy? Lots of other questions... Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
  • 37. djlogo.jpg Secure System Design What is an overall system architecture that supports our security goals? (system design) By what specific mechanisms might the security goals be accomplished? (detailed design) Does the system implementation accomplish the goal? How certain can we be of our assessment? Are there intuitively insecure behaviors that fall outside the range of the policy? Lots of other questions... Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
  • 38. djlogo.jpg Secure System Design What is an overall system architecture that supports our security goals? (system design) By what specific mechanisms might the security goals be accomplished? (detailed design) Does the system implementation accomplish the goal? How certain can we be of our assessment? Are there intuitively insecure behaviors that fall outside the range of the policy? Lots of other questions... Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 9 / 24
  • 39. djlogo.jpg Multilevel Security Models Bell La Padula Model Biba Model Chinese Wall Model Clark-Wilson Model Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 10 / 24
  • 40. djlogo.jpg Multilevel Security Models Bell La Padula Model Biba Model Chinese Wall Model Clark-Wilson Model Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 10 / 24
  • 41. djlogo.jpg Multilevel Security Models Bell La Padula Model Biba Model Chinese Wall Model Clark-Wilson Model Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 10 / 24
  • 42. djlogo.jpg Multilevel Security Models Bell La Padula Model Biba Model Chinese Wall Model Clark-Wilson Model Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 10 / 24
  • 43. djlogo.jpg Bell LaPadula Model David Bell, Len Lapadula An abstract model intended to control information flow Prevent unauthorized disclosure of information Objects have a security level (e.g., unclassified, classified, secret, top secret) Security levels are arranged in Linear order Subjects (think: principals, processes) have a level Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
  • 44. djlogo.jpg Bell LaPadula Model David Bell, Len Lapadula An abstract model intended to control information flow Prevent unauthorized disclosure of information Objects have a security level (e.g., unclassified, classified, secret, top secret) Security levels are arranged in Linear order Subjects (think: principals, processes) have a level Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
  • 45. djlogo.jpg Bell LaPadula Model David Bell, Len Lapadula An abstract model intended to control information flow Prevent unauthorized disclosure of information Objects have a security level (e.g., unclassified, classified, secret, top secret) Security levels are arranged in Linear order Subjects (think: principals, processes) have a level Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
  • 46. djlogo.jpg Bell LaPadula Model David Bell, Len Lapadula An abstract model intended to control information flow Prevent unauthorized disclosure of information Objects have a security level (e.g., unclassified, classified, secret, top secret) Security levels are arranged in Linear order Subjects (think: principals, processes) have a level Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
  • 47. djlogo.jpg Bell LaPadula Model David Bell, Len Lapadula An abstract model intended to control information flow Prevent unauthorized disclosure of information Objects have a security level (e.g., unclassified, classified, secret, top secret) Security levels are arranged in Linear order Subjects (think: principals, processes) have a level Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
  • 48. djlogo.jpg Bell LaPadula Model David Bell, Len Lapadula An abstract model intended to control information flow Prevent unauthorized disclosure of information Objects have a security level (e.g., unclassified, classified, secret, top secret) Security levels are arranged in Linear order Subjects (think: principals, processes) have a level Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 11 / 24
  • 49. djlogo.jpg Bell La Padula Model for Institute Security Level Subject Object Top Secret Principal Personal Email Secret Secretary Official Email Confidential Office Assistant Personal Data(Drive), Official Data(PC) Unclassified HOD, Faculty NAAC Data, NBA Data, AICTE Data Table: Example: Simple Bell Lapdula Model Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 12 / 24
  • 50. djlogo.jpg Bell La Padula Model Figure: Information Flow 2 Information Flow “UP”not “DOWN” “No Read up”and “No Write Down” 2www.cs.utexas.edu/~byoung/cs361 Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 13 / 24
  • 51. djlogo.jpg Bell La Padula Model Figure: Information Flow 2 Information Flow “UP”not “DOWN” “No Read up”and “No Write Down” 2www.cs.utexas.edu/~byoung/cs361 Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 13 / 24
  • 52. djlogo.jpg Bell La Padula Model Figure: Information Flow 2 Information Flow “UP”not “DOWN” “No Read up”and “No Write Down” 2www.cs.utexas.edu/~byoung/cs361 Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 13 / 24
  • 53. djlogo.jpg Dominates Relation Figure: The Dominates Relation 3 3https://www.cs.utexas.edu/~byoung/cs361 Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 14 / 24
  • 54. djlogo.jpg Partial Order Figure: Partial Ordering 4 4https://www.cs.utexas.edu/~byoung/cs361 Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 15 / 24
  • 55. djlogo.jpg Lattices Algebraically, the (full) set of labels with their ordering would form a lattice. This is sometimes called “lattice-based security.” a lattice is a partially ordered set (or poset) Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 16 / 24
  • 56. djlogo.jpg Lattices Algebraically, the (full) set of labels with their ordering would form a lattice. This is sometimes called “lattice-based security.” a lattice is a partially ordered set (or poset) Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 16 / 24
  • 57. djlogo.jpg Secure Reading Suppose subject S with authorization (LS , CS ) asks to read an object O with classification (LO, CO). Under what conditions should the request be granted by the system? For example, suppose a subject has clearance (Secret: Crypto). Which of the following should he be able to read? -document labeled (Confidential: Crypto) -document labeled (Top Secret: Crypto) -document labeled (Secret: Nuclear) -document labeled (Secret: Crypto, Nuclear) Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 17 / 24
  • 58. djlogo.jpg Secure Reading Suppose subject S with authorization (LS , CS ) asks to read an object O with classification (LO, CO). Under what conditions should the request be granted by the system? For example, suppose a subject has clearance (Secret: Crypto). Which of the following should he be able to read? -document labeled (Confidential: Crypto) -document labeled (Top Secret: Crypto) -document labeled (Secret: Nuclear) -document labeled (Secret: Crypto, Nuclear) Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 17 / 24
  • 59. djlogo.jpg Simple-Security Property The Simple-Security Property: Subject S with clearance (LS , CS ) may be granted read access to object O with classification (LO, CO) only if (LS , CS ) dominates (LO, CO). OR Subject S with clearance (LS , CS ) may be granted read access to object O with classification (LO, CO) only if (LS , CS ) (LO; CO): Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 18 / 24
  • 60. djlogo.jpg Simple-Security Property The Simple-Security Property: Subject S with clearance (LS , CS ) may be granted read access to object O with classification (LO, CO) only if (LS , CS ) dominates (LO, CO). OR Subject S with clearance (LS , CS ) may be granted read access to object O with classification (LO, CO) only if (LS , CS ) (LO; CO): Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 18 / 24
  • 61. djlogo.jpg Simple-Security Property The Simple-Security Property: Subject S with clearance (LS , CS ) may be granted read access to object O with classification (LO, CO) only if (LS , CS ) dominates (LO, CO). OR Subject S with clearance (LS , CS ) may be granted read access to object O with classification (LO, CO) only if (LS , CS ) (LO; CO): Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 18 / 24
  • 62. djlogo.jpg Figure: Reading Information 5 5http://nob.cs.ucdavis.edu/ Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 19 / 24
  • 63. djlogo.jpg The *-Property The *-Property: Subject S with clearance (LS , CS ) may be granted write access to object O with classification (LO, CO) only if (LS , CS ) (LO; CO): Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 20 / 24
  • 64. djlogo.jpg Figure: Writing Information 6 6http://nob.cs.ucdavis.edu/ Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 21 / 24
  • 65. djlogo.jpg Bell Lapdula Model : No Read Up, No Write Down Figure: Writing Information 7 7http://nob.cs.ucdavis.edu/ Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 22 / 24
  • 66. djlogo.jpg Example Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 23 / 24
  • 67. djlogo.jpg Open Questions Teaching assistant reading notes created by faculty. Faculty members correcting assignments of students. Faculty members correcting notes of Teaching Assistant. AICTE Letter received by Principal is opened and read by HODs HOD correcting applications made to Principal Principal putting remarks on Students applications Students correcting ppts made by Faculty HODs writing remarks on AICTE files meant for Principal HODs reading billing information submitted by Daily workers Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
  • 68. djlogo.jpg Open Questions Teaching assistant reading notes created by faculty. Faculty members correcting assignments of students. Faculty members correcting notes of Teaching Assistant. AICTE Letter received by Principal is opened and read by HODs HOD correcting applications made to Principal Principal putting remarks on Students applications Students correcting ppts made by Faculty HODs writing remarks on AICTE files meant for Principal HODs reading billing information submitted by Daily workers Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
  • 69. djlogo.jpg Open Questions Teaching assistant reading notes created by faculty. Faculty members correcting assignments of students. Faculty members correcting notes of Teaching Assistant. AICTE Letter received by Principal is opened and read by HODs HOD correcting applications made to Principal Principal putting remarks on Students applications Students correcting ppts made by Faculty HODs writing remarks on AICTE files meant for Principal HODs reading billing information submitted by Daily workers Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
  • 70. djlogo.jpg Open Questions Teaching assistant reading notes created by faculty. Faculty members correcting assignments of students. Faculty members correcting notes of Teaching Assistant. AICTE Letter received by Principal is opened and read by HODs HOD correcting applications made to Principal Principal putting remarks on Students applications Students correcting ppts made by Faculty HODs writing remarks on AICTE files meant for Principal HODs reading billing information submitted by Daily workers Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
  • 71. djlogo.jpg Open Questions Teaching assistant reading notes created by faculty. Faculty members correcting assignments of students. Faculty members correcting notes of Teaching Assistant. AICTE Letter received by Principal is opened and read by HODs HOD correcting applications made to Principal Principal putting remarks on Students applications Students correcting ppts made by Faculty HODs writing remarks on AICTE files meant for Principal HODs reading billing information submitted by Daily workers Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
  • 72. djlogo.jpg Open Questions Teaching assistant reading notes created by faculty. Faculty members correcting assignments of students. Faculty members correcting notes of Teaching Assistant. AICTE Letter received by Principal is opened and read by HODs HOD correcting applications made to Principal Principal putting remarks on Students applications Students correcting ppts made by Faculty HODs writing remarks on AICTE files meant for Principal HODs reading billing information submitted by Daily workers Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
  • 73. djlogo.jpg Open Questions Teaching assistant reading notes created by faculty. Faculty members correcting assignments of students. Faculty members correcting notes of Teaching Assistant. AICTE Letter received by Principal is opened and read by HODs HOD correcting applications made to Principal Principal putting remarks on Students applications Students correcting ppts made by Faculty HODs writing remarks on AICTE files meant for Principal HODs reading billing information submitted by Daily workers Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
  • 74. djlogo.jpg Open Questions Teaching assistant reading notes created by faculty. Faculty members correcting assignments of students. Faculty members correcting notes of Teaching Assistant. AICTE Letter received by Principal is opened and read by HODs HOD correcting applications made to Principal Principal putting remarks on Students applications Students correcting ppts made by Faculty HODs writing remarks on AICTE files meant for Principal HODs reading billing information submitted by Daily workers Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24
  • 75. djlogo.jpg Open Questions Teaching assistant reading notes created by faculty. Faculty members correcting assignments of students. Faculty members correcting notes of Teaching Assistant. AICTE Letter received by Principal is opened and read by HODs HOD correcting applications made to Principal Principal putting remarks on Students applications Students correcting ppts made by Faculty HODs writing remarks on AICTE files meant for Principal HODs reading billing information submitted by Daily workers Dr.Ramchandra Mangrulkar, DJSCE Mumbai Lecture #6: Multi-level Security August 13, 2020 24 / 24