|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T o
Length: 537 (0x219) Types: TextFile Names: »orange-book.tex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦36857feb3⟧ »./papers/Security_Primer/primer.tar.Z« └─⟦5c5f5f2d8⟧ └─⟦this⟧ »orange-book.tex«
\section{Orange Book} You have doubtlessly by now heard of the ``Orange Book'' and perhaps of the whole rainbow series. Much of the ``Orange Book'' discusses discretionary and mandatory protection mechanism and security labeling. Another section deals with ``covert channels'' for data to leak out. While most of these issues are not important in a university, the ideas of protecting password files (even when encrypted), individual accountability of users and password aging are worth implementing in an unclassified environment.