U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

AUDIT AND SURVEILLANCE OF MULTI-LEVEL COMPUTING SYSTEMS

NCJ Number
57971
Author(s)
C ENGELMAN
Date Published
1977
Length
41 pages
Annotation
THE AUDIT AND SURVEILLANCE TECHNIQUES DESIGNED TO AUGMENT THE SECURITY CONTROLS OF A MILITARY MULTILEVEL RESOURCE-SHARING SYSTEM WITH A SECURITY KERNEL ARE DESCRIBED.
Abstract
AUDIT AND SURVEILLANCE ARE TWO TECHNIQUES FOR OBSERVING THE WAY USERS EMPLOY A COMPUTER RESOURCE. AUDIT ANALYZES USE AFTER THE FACT WHILE SURVEILLANCE ACTIVELY MONITORS USER BEHAVIOR FOR CERTAIN CHARACTERISTICS. THESE TWO TECHNIQUES HAVE BEEN RECOMMENDED AS COMPUTER SECURITY METHODS, BUT ANYONE WHO KNOWS HOW TO USE THE SOFTWARE CAN CIRCUMVENT THEM. A BETTER SECURITY SYSTEM FOR A MULTILEVEL SECURE COMPUTING ENVIRONMENT IS ONE BASED ON A SECURITY KERNEL. THEN AUDIT AND SURVEILLANCE SOFTWARE CAN PROVIDE SECURITY BACKUP. AUDIT SOFTWARE CAN BE OF TWO TYPES. THE FIRST GIVES THE SECURITY OFFICER THE ABILITY TO CHOOSE WHICH EVENTS ARE AUDITED FOR WHICH PROCESSES OR USERS, THE SECOND ALLOWS THE OFFICER TO SEARCH THE VOLUMINOUS RECORDED DATA FOR SPECIFIC EVENTS. SURVEILLANCE STRATEGIES CAN INCLUDE BOTH ESOTERIC SYSTEMS, SUCH AS PATTERN MATCHING OR ENTRAPMENT, AND SIMPLE SOFTWARE WHICH MIGHT INCLUDE ALARMS TO CALL ATTENTION TO PATENT ATTEMPTS AT PASSWORD GUESSING OR TO ESPECIALLY HIGH FREQUENCIES OF ATTEMPTED PROTECTION VIOLATIONS. THE PROTECTION RECOMMENDED FOR THE AIR FORCE SECURITY KERNEL-BASED MULTICS SYSTEM THEN IS DISCUSSED IN GENERAL, NONCLASSIFIED TERMS. THE PROPOSED SYSTEM WOULD COMBINE MANY AUDIT AND SURVEILLANCE APPROACHES AND WOULD DIVIDE THESE FUNCTIONS AMONG A NUMBER OF PERSONNEL. (GLR)

Downloads

No download available