|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T o
Length: 537 (0x219)
Types: TextFile
Names: »orange-book.tex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
└─⟦36857feb3⟧ »./papers/Security_Primer/primer.tar.Z«
└─⟦5c5f5f2d8⟧
└─⟦this⟧ »orange-book.tex«
\section{Orange Book}
You have doubtlessly by now heard of the ``Orange Book'' and perhaps
of the whole rainbow series.
Much of the ``Orange Book'' discusses discretionary and mandatory
protection mechanism and security labeling. Another section deals with
``covert channels'' for data to leak out. While most of these issues
are not important in a university, the ideas of protecting password
files (even when encrypted), individual accountability of users and
password aging are worth implementing in an unclassified environment.