Hi, guys. Welcome to domain one Lesson two of the S S. C. P course starring me. Your host Peter Sip alone.
Tonight's lesson is about security model, specifically ones focusing on confidentiality The model will be focusing on tonight is the Bell UPA jewel model, which has been designed with confidentiality in mind. This model is mostly used in government military installations and has two properties
the simple security property
otherwise known as no read up on the star property known as know right down.
Let's take a look at an example here, in this example, we have four different security level clearance is that the military uses we have unclassified, confidential, secret and top secret.
John from the FBI has Secret Clearance
File A is labeled top secret.
This means John cannot read file because one of the properties of this of the Bella Pa. Jewel model is no read up. That means John cannot read anything that is above the secret level Secret clearance level
file be is labelled confidential.
He can read file be because it is below his secret clearance level. He cannot write to it because it is no right down
John can read file Sea, but he cannot write to it. He can read it because it is the same security clearance level that he has, but he cannot write toe because of the property. No. Right down.
In summary, our brief lecture, we discussed the overall view of the Bell apostle of Security model and its properties.
creates a file on his computer and inside, he puts secret information on a dangerous criminal.
John needs to give access to others to this file, but he only wants people to see if they have the same security clearance that he does. Or a higher security clearance. Which security model should he use?
If you answered, See the bell? A popular model? Obviously you are correct.
Hope you guys learned a lot in this video. Thank you for watching