TRUSTED SYSTEMS
Network Security And Cryptography
By:-
SUMITA DAS
 To enhance the ability of a system to defend against-
Intruders
malicious programs.
Created by Sumita Das
Access Matrix:
 Subject
 Object
 Access right
Created by Sumita Das
Access Control List:
Decomposition of the matrix by columns
Created by Sumita Das
Capability list:
Decomposition of the matrix by rows
Created by Sumita Das
 Protect data and resources on the basis of levels of
security.
Unclassified(U)
Confidential(C)
Secret(S)
Top Secret(TS)
Created by Sumita Das
 Multilevel security: Multiple categories or levels of
data
 Multilevel secure system must enforce:
 No read up (Simple Security Property)
 No write down(Property)
 Security levels may be linear or latticed
Created by Sumita Das
 Provides multilevel security for a data processing
system
 Controlling element in the hardware and operating
system of a computer that regulates the access of
subjects to objects on the basis of security parameters
of the subject and object.
Created by Sumita Das
Created by Sumita Das
 Complete mediation
 Isolation
 Verifiability
Created by Sumita Das
 Secure, trusted operating systems are one way to secure
against Trojan Horse attacks
Created by Sumita Das
[1]William Stallings, “Cryptography and
Network Security Principles and Practices”,
Fourth Edition
Created by Sumita Das

Trusted systems1