6) RA
M Tetdl Taname = BOeIngl artifact pa Ceotified’) )
i TAS
{euctdl Ce certified nd AE artifact (cxaid = araid
Maname ='Bocing yy
Ea
DAT a :
‘ i : , ide
eden gare caye tivcrabt eae ET
certified ( Aeaid> care A anampz Bocing Jy
pa
LiCreiel] < 41d ,a'C-E certified a Gicd AM CF Aid, ONNC- #7?
© artifack (aptaid= aid A aname = ‘Boeing’ Wy
ii)
Rat
Vrames( Aname = ‘Boeing’ (Aircratt pacesttied))
Klemployee -
Tefly Ee Empoye:
{g€ename a certified AE Airc raft (Eaid= Aaid a
Qname= ‘poeing yn feid=coetd dy
DAT EEIAa,EMETe employee
Lcery | Eeidaidy E Certified athid dine»
1poreo
(Flights ba Aircraft pgcertified employee)
BC
cial Hight 03 Ac Airckaft a a Ce certified A
FLEE Ermployer (4:crushing range Faistance A
Es Salary > 100,000 Avaid= caida
Eectancreid)y
Dat
{centr |er Hy FE,ET FOG, FOE, FM
Acad? cert
AER
> C Flight A
Dacerd, ead d Ce Wied aD Aaid At AR
FNO00
SE OAE*
A Arardzceaid nt seidaccid %
y Rar
Me aid (eznohing raanqe atstance( Aiichl
oon to taackasy)
BA
Farad} aC awtralt WS Fe Highs (F shorn = "Bonn A
EeTo: tena?) A arcrashingrang ert wdigtarce)
Dent > 4 bos
tena [enatd, AN apre Aircrahe AS Fue, FEAT ED,
Fary & Flight €
FOr, FAY < Fao Fh F 1) FDI, Fe,
Certo eehas ‘
Fete peli’ arr = ‘enarad A FRirecah’8 Rea, BCP, TY
A-rc
Ac-+P
~yAP
bor *
4
A= face
PHkEA MC WY
*
credo tt, APC dont ke any
ime edilote key here.
acl fAycy Dh,
D RCA,B,C, PLE TG, tT)
Fr ABC wablefa Berl
: +
POG Ad afayD, GH TY
Borer made gape ee 1)
7x +
War a f ada
au -fenTy
(aco: Gay Byey EG (My) candidate ke
y
Prime Altributes = ABD
non paeattributes 2G Epp Snr,
A relation. Said to be SNF fe Folds aHead:
ene OF the follcding’s hdding non “Tivat feistiog
ae
“1S pouper key
B 1s prime attribot ¢
Ab c
3 Seperkey and “nor prime At
ABC at
ard Po prime! att
AD Gt ane cuperkegy
“BD EF PPyok supetkey ana, hot wou oe
- not Key AAT ig nor Pe
a * ae “Oreos
ArT ve
woys U ane Arerkey “aed
tow teJo the Relation
1 Tee al?
SP:
fo. not -folioceing the rate Of 3Nt
Rcaset) Rn = a BC)
Rio.= CAT)
RoCAPG HT) Rare cach)
Roo = Cy)
T3 (BEN)
RyCaBd)
wow
Rr Rr, Rar R22 RBPH are in, SNE
o) RBC DI -
~ x
Pe eg Per eee eee
cB Coe CrAacy
cB A tonside? pon 6
p>AaBe b> a>B oon
poe p7e
nm pc pac
ac-yP ac7d
+ AaB
d- fact dayc,O@ 184
Care :
ork a fA,BY Ac-+O
vty Ase OY
notMethod Fs
nS ney frec re}
Noho ow pond have. reeu reg
accent ary iadneenarels, ‘ction LE Me earmbinalion of
i Mac - Mandatory access lontoo! [palcies and
‘technolgies th
; No
tontyo! eee
j Acres contro!
Dpac —Direct iy — ACCRA contd
3) RBAC —Role- Based ACh
-a@ centrally manag
cf Security.
policies by
Mac t
Mancotary acte.
medet to provide
wr teserves
Secevsity
gg contiol Ses
the highest fevel
over alceep
administration a
contol
a centialiged
© MAC eworks by applying
Individetals eTheae security
Security labels and
labels consist
of two elements
> classification and Clearance
a
‘|
e> Compartment -
1) Clasafication: and Cleararre
@ Clappification System
ecret ekcy) that descai les
mac teltes on
eatticte: crt; TOP-S
esa e Sehsitaity oe ri
WO A Spcrek PUTS, Bec erdi
C& resource they May aCLe pp
cormpaitreents” It- dest beg
group & People ~
Clearance p detest
eohat Kind
Advantages
1) enforceability
2) CompartmentAtisalin.
in 3
1) coltabration
2) Managment buick on.vy
Discretionary
decisions tO
nthe Skating option fs most operathg
5 in the form OF DAC + For each datement
n
Can sett read | alrite Privilages and
a table of individuals
Access Control ctecenttalige
ge cerdity resource Oconer
system i
yorr ote) » You
gould requirments colin
graups» System admin
SeCrire, acces to
and ser Strakes can
fe BarNe technique to
us
ne kwork requirment
Adv
1) Concept cial Siraplicity
9) Responsive to bussiness needs
pisadVvr
) over |uincerprivilqed users
9) LUmited Conteo!
3) Comprised se curditey
entrol (RBA)
contol gran aceess privileg,
fnclivictual Users clo +
Role-based acce bp c
ey Role~ based aceepp
hagd on the agik thak
« wo
n popular cay toc {rnplementing least
firnity cece 58 bo rat Ue
ReAC
privilege” policies ,
users eect to
do their job
resources.
based on Centialiged and
o Th ereccites
decentiallyed -
Adwt '
Fleubility:
fasy to maryntenance
centialiget ard decentraliged policies:
Lower risk = ETPOSUre =a
»
ay
Something to be
_pigadvantages 2”
el a
1) Complen depleyrnent- at
eoith Siroplici ty-
9) Palaneing gecuoity
permissions.
3) layered roles and
Compute Based Controls
1) Backup ard recovery:
XY Authentication ~
The processing oF proving or showing
true or genuine al Noict
Egh ringer prins valid persoms o
Checking Whether the
print 8 Valid (HA nok
Passotld, Pace tecognisates
Authorization + 4 .
he process, F giving Permission
Giving permission; to Use aata «
ereriviliqes 3
o> Auaitive
ACLEBP tontol®
given persons fi
4)
Giving: permission .
pre revoking fe permission
v t
Removing the Ppewmnission.
5) sFoubleshooling Process #, golving serious
ogareigalin ‘
spies gor CONTRI OF Pier
te. dnd . gorrect folky in the
{hich bral
Syston:
6) Trtegrity: Provide + conditions
: + OF Conatr;
related 0 Mectificatiins, strony4) Encryptiont
qnternet related
Encrypt the data and sen
different “félmect
(ene Sa
Encrypt pecrypl *
49505,
ct the data in
6 SyrMazic :
. Asuyrametric (deprerent fates)
g) RAPIDE Redundant fay O& Fndependent-
Data:
We can qo with back -Up Syste
Gy ics
Stuclent- po
Tp ame. [Poe Tp | Marks:
view - :
be Ue Ig :
s mps (nteusion election “systerny'e
> checks OF onikys , Netcare Boreic
chec' 7
ey Tf any gugpicious activity is found oF
wecoqriged OP alert 1s Sen to the User
Yo Secure you" rte
clap Pication
1) NIDS -""
a) HWS
3 PIDs
4) AIpS°
b) Hybrid:NUDS is 2
’ fromm, the devices
ery, monitors the traffic
e tonnected to networks, ang
reer!
oat Compares Wide lees from various yg
amd check for NY OM Mferenation and _aterts
to adryn:
tk Can't detech
erat inféimation encrypted
er Tt large data ts present te) Gantt identi,
che Abteat
Thttusion —* yo) '
'
! fl
S& $e 83
HDs '-
oe IF briqges signed. ewith in The Systern OF
her SYSken.
independent “to of
adrein
io detected:
oF If Buspisicoy activity
c at takes the enapshech, of enisiting -files
and compare Tt to the ‘previous Srapsbes TF
analytical
Te bend Nn alert
Tnbysion
§
fies were edited & deleted.
fo adtein to Redtigadpips
oy TH Sb infionk of — mhovtkéy main Server
and ronildis the end Server
vy Tt eee hebservers by regulary moni sling
ant dusey entry of unauttrol ged
ffoimation
APLD st
Based on pips it generally
gqicuP oe} servers
yesides worth
Uybaid |
ey is the Combination oF Feo at mite intrusion
detection Sy ster -
host agent BL systero dqent
infétmation Fo
the netw9tle
o> Th IDS etek
fo Combined with netugnle
develop & Complete View OF
Syston
4)’ petection
fy =
methed EF tps’
1) Signaterre base Method -
cy Te detects, atta attacks ¢
such as ho of bytes, Number
n the bases g
specified pattern
a "stds
ey rp datects thea cohich ae already Known
snateectin
matusare -
teacivantoge
Sequence that is) lusect to
mal{ctoc4
The Mayr fo ik cannot cetech
Mn Mew Wht ead - cased by Atystew
icDanomaly- hated Detecting Methed
Te 16 for deteting beth
Fompute™ infusing and Misues by
Systern — activity and Classifying
eilrer aired! anoraloos,”
ne tule
Distributed Database
e> Te consish & two 4 mor files local
in different sites @ither fn
different netrcok -
t-» Portions of the data bases are, Sled 4
reuitiple physical {oCations = and processing tg
distributed among emultiple databape nodes:
Game nekusdl le
Web, dakabose
err i datobar System for Storing and
fromm internet]
information accessible
displaying
vieb°
eo DB Can be used fA wee range O-
-funclions remboship data, Client list,
p
Tinvertoy database
logical, palakase!
ott, provides a fead- onl
oy ar used to retrieve
tables and data is
each othe
I viewor date.
data‘ ficrs various,
-jnteneltated to