Loading...

Course Description

Sometimes the owner of an object is not, in fact, the one to determine who should get access to that object; rather, it is an institutional policy that dictates that decision. This form of access control is known as mandatory access control, and it is frequently used in business and military settings. In this course, you will review various forms of mandatory access control policies and their implementations, including multilevel security, commercial, and role-based access control schemes.

It is recommended to only take this course if you have completed “Systems Security,” “Authenticating Machines,” “Authenticating Humans,” and “Discretionary Access Control,” or have equivalent experience.

Faculty Author

Fred Schneider

Benefits to the Learner

  • Determine whether mandatory access control is appropriate for a given system
  • Design a multilevel security scheme for confidentiality and/or integrity, a commercial security scheme given a set of accounting rules, and a role-based access control scheme
  • Describe the advantages and disadvantages of multilevel, commercial, and role-based access control schemes
  • Choose which mandatory access control scheme to use for a given system
  • Identify the advantages and challenges of credentials-based authorization schemes and recognize the trade-offs of different solutions

Target Audience

  • IT professionals
  • Developers
  • Programmers
  • Analysts
  • Software engineers
  • Cybersecurity professionals

Accrediting Associations

Applies Towards the Following Certificates

Loading...
Cornell Computing and Information Science
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .