Systems-specific policy (syssp), Computer Network Security

Assignment Help:

Systems-Specific Policy (SysSP)

SysSPs are codified as standards and procedures which are used when configuring or maintaining systems. Systems specific policies fall into 2 groups:-


•Access Control Lists (ACLs) is a list of access rights which is used to determine who may access an object which it controls.
•Configuration rules is a specific codes entered into security systems to guide exection

The Microsoft Windows and Novell Netware 5.x/6.x families translate ACLs into configurations which are used to control access. ACLs allow configuration to restrict access from anyone.

An access control list is the list of permissions which is attached to an object. The list specifies who or what is allowed to access object and what operations are allowed to be performed on object.

Access Control List (ACL)

- Include user access lists, matrices, and capability tables which govern rights and privileges
- Can control access to file storage systems, object brokers or other network communications devices
-ACLs enable administrations to restrict access in accordance to user, computer, time, duration, etc.
-Capability Table: similar method which specifies which  subjects and objects users or groups can access
-Specifications are frequently complex matrices, instead of simple lists or tables
Rule policies are specific to operation of a system than ACLs. Several security systems require specific configuration scripts telling systems what actions to perform on each set of information which they process.

Configuration rules
-Specific configuration codes entered into security systems to guide execution of system when the information is passing through it
-Rule based policies are more specific to system operation than ACLs and can or cannot deal with users directly
-A number of security systems require specific configuration scripts telling systems what actions to perform on each set of information processed


Related Discussions:- Systems-specific policy (syssp)

Direct sequence modulation, Question 1 a) Provide three advantages of ...

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

Characteristics of radial basis function neural networks, Problem : (a)...

Problem : (a) Provide one possible classification of PCA, ART, RBF, and Fuzzy ARTMAP networks. (b) Describe in detail the characteristics of Radial Basis Function Neural Net

How to create a security policy, Five years ago, Calgary Kids' Cloth Ltd wa...

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

Introduction to planning for security, INTRODUCTION TO PLANNING FOR SECURIT...

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

How an attacker can effectively de-layer and analyse data, Around the globe...

Around the globe the bank controlled Co-ops (Visa, MasterCard, Discover, and American Express) have rolled out millions of smart cards under the EMV (Europay, MasterCard, VISA) sta

Pinging a web server, Ask quIf you are pinging a web server from a user’s c...

Ask quIf you are pinging a web server from a user’s client PC, how might the statistical information provided by ping be useful to you?estion #Minimum 100 words accepted#

Pcm encoder, You have been asked to setup a remote temperature sensing syst...

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

Wfabilling project in java, WFABilling project in Java:  Project Title...

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

Packets and frames, PACKETS: Packet is a generic word that define to sma...

PACKETS: Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.  FRAME: A hardware frame or

Attacks on cryptosystems-cryptography, Attacks on Cryptosystems Attacks a...

Attacks on Cryptosystems Attacks are attempts to achieve unauthorized access to secure communications have characteristically used brute force attacks. Attacker may alternatively

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd