What are the MLS general access rules?

What will be an ideal response?


The two general access rules are as follows:
1. No Read Up
A user can read the data as long as the user's classification is the same as or higher than the data's classification. For example, a Top Secret user can read files that are either Top Secret, the same level, or Secret, a lower level. However, a Secret user cannot read files that are classified as Top Secret.

2. No Write Down
A user can write to the resource as long as the user's classification is the same as or lower than the resource's classification. For example, a Confidential user can save his or her data files as Confidential resources or Secret resources. However, a Secret user cannot save data files in spaces that are classified as Confidential or Unclassified. This rule prevents leaks of higher-classification data to lower classifications.

Computer Science & Information Technology

You might also like to view...

Add the INSTALL DESKTOP COMPUTER use case to the upper right area of the diagram. This use case extends the ADD NEW COMPUTER use case.

What will be an ideal response?

Computer Science & Information Technology

If multiple documents are open in a program, Lion will show the most recently accessed documents in the active window.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When using the shape attribute value of rectangle in an image map, what coordinate(s) specify the upper left corner of the rectangle?

A) x1,y1 B) x1 C) x1,y2 D) y2

Computer Science & Information Technology

By default, a Cisco router will try several times to find an IP address for a name if you enter one. This automatic translation is called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology