Describe the how access control lists are used

Assignment Help PL-SQL Programming
Reference no: EM131882671

Assignment

Instructions:

Answers to be numbered and in order. Include the page number and your name on each page. For questions 5 use the Scenario contained in the SQL Scripts provided as a separate attachment.

1. Security Plans, Policies, Procedures, and Models.

a. Describe the key features of a Security Plan (What is it? Why is it important? What are its key parts? Who is it for? How does it work or not work? (Problems with creating and implementing).

b. What is the role of Security Policies? (What is a Security Policy? How do Policies relate to Procedure? How do Policies relate to the Security Plan?)

c. What is the role of Security Procedures? (What is a Security Procedure? How does it relate to Security Policies and Plans?)

d. What is the purpose of a Security Model? (What do models do? How do they do it? What is in a model? What is not in a model?)

2. Access Matrix Model, Access Control Lists

a. Describe the Access Matrix Model (Key features, and a graphic example)
b. Describe the How Access Control Lists are used (Key features, graphic example)

3. Bell-LaPadula Model

Describe the Bell-LaPadula Model (What kind of model is it? What are its key Features? What are its key Axioms? ( include a graphic example)

4. Jajodia Sandhu Model

Employee

SSN

C1

Name

C2

Salary

C3

DN

C4

TC

001

U

Able

S

20000

U

C100

U

S

002

U

Bond

U

45000

S

C200

U

S

003

U

Coe

C

70000

S

C300

C

S

004

U

Drake

C

135000

TS

C400

C

TS

Suggested way to proceed:

Take the original multilevel table given and decompose it into two tables. One at the Secret level (containing everything that should be shown as the Secret Level) and one at the Top Secret level (which is actually the same as the original table at this point).

Use these two freshly created tables as the input tables for both parts a and b (in other words DO NOT use the OUTPUT result from a as input to b).

For part a. Apply all the transaction to the two new tables and show the end result as your answer to part a (as updated set of both tables).
For part b. Apply all the transaction to another fresh copy of the two new table (meaning don't use the output tables from part a as input to part b) and show the end result as your answer to part b.

a. Suppose an S-subject requests the following insert operations (show the effect on the instance tables for both the secret and top secret level). Your answer will be two new tables (one at the Secret Level and One at the Top Secret Level -- with the necessary changes included --) that show the result of the inset and update transactions below (15 points).

INSERT INTO Employee

VALUES 005, "Jones", 80000, "C400";

INSERT INTO Employee
VALUES 001, "Able", 90000, "C300";

UPDATE Employee
SET Salary = 50000
WHERE Name = "Bond" or "Drake";

b Suppose a TS-subject request the following insert/update operations (show the effect on the instance tables for both the secret and top secret level). Your answer will be two new tables -- with the necessary change included -- that show the result of the inset and update transactions below (15 points). Remember: For part b. Apply all the transaction to another fresh copy of the two new table (meaning don't use the output tables from part a as input to part b) and show the end result as your answer to part b.

INSERT INTO Employee

VALUES 002, "Bond", 90000, "C300";

UPDATE Employee
SET Salary = 60000;

NOTE: There is NO WHERE Clause in this statement. This is intentional.

Attachment:- Scenario.rar

Reference no: EM131882671

Questions Cloud

Discuss the challenges of evidence-based writing : Discuss the challenges of evidence-based writing and how it is different from sharing opinions.
How does one ensure us culture does not dominate : How diversity and difference characterize and shape the human experience and are critical to the formation of identity
Chemical dependency counseling : Why is the concept of confidentiality so important in human service work and in chemical dependency counseling?
Discuss the socioeconomic consequences : Discuss the socioeconomic consequences of having a large uninsured population in the U.S. Describe the changes that will occur to assist the uninsured.
Describe the how access control lists are used : Describe the How Access Control Lists are used? What is the purpose of a Security Model? What do models do? How do they do it? What is in a model?
Determine the break-even point in dollar sales : Determine the break-even point in dollar sales. determine the proper mark-up percentage for this product.
Conduct an accurate job analysis : In order to conduct an accurate job analysis, Human Resource professionals rely on various stakeholders (such as managers, employees, other businesses).
What are the benefits and pitfalls of each approach : Why do some organizations promote from within, whereas others rely on outside hiring? What are the benefits and pitfalls of each approach?
Thoughts on being a mandated reporter : Share with the class your three thoughts on being a mandated reporter.

Reviews

Write a Review

PL-SQL Programming Questions & Answers

  Create a database model

Create a database model and Submit the table creation statements for the Database Model.

  Write pl-sql procedures and functions

Write PL/SQL procedures and functions to populate and query that database

  Sql questions

Write a query to display using the employees table the EMPLOYEE_ID, FIRST_NAME, LAST_NAME and HIRE_DATE of every employee who was hired after to 1 January, 1995.

  Run the lab_03_01.sql script

Run the lab_03_01.sql script in the attached file to create the SAL_HISTORY table. Display the structure of the SAL_HISTORY table.

  Write sql queries

Write a query to display the last name, department number, and salary of any employee whose department number and salary both match the department number and salary of any employee who earns a commission.

  Explaining sql insert statement to insert new row in cds

Write down a SQL insert statement to insert new row in "CDS" table.

  Write down name of actors in ascending order

Write down actors (or actress, your choice, but not both) who have won at least two (2) Academy Awards for best actor/actress. Provide the actor name, movie title & year. Order the result by actor name."

  What is an sql injection attack

What is an SQL injection attack? Explain how it works, and what precautions must be taken to prevent SQL injection attacks.What are two advantages of encrypting data stored in the database?

  Determine resonant frequency in series rlc resonant circuit

Given the series RLC resonant circuit in the figure, operating at variable frequency, determine: The resonant frequency ω o ,  The circuit’s quality factor Q , The cut-off frequencies, f 1  & f 2  and the bandwidth BW

  Query that uses cube operator to return lineitemsum

Write summary query which uses CUBE operator to return LineItemSum (which is the sum of InvoiceLineItemAmount) group by Account(an alias for AccountDesciption).

  Query to show customers were missing for existing orders

As DBA, your manager called a meeting and asked why there are so many orders for customers that don't exist in the customer table. Write query which would shows which customers were missing for existing orders. Use a join or a subquery.

  Sql query into a relational algebra statement

Turn this SQL query into a relational algebra statement? SELECT Request.reqfor, Ordering.invamt, Ordering.invnbr, Ordering.invdat

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd