Publisher:Institute of Statistical Studies and Research, Cairo University
Series Info:Egyptian Computer Journal;Volume: 37 Issue: 1 Pages: 75-89
Type:Article
Keywords:October University for University of Security Policy, Multilevel Security, Data Integrity Verification, Access Control, ACL, DAC, MAC
Abstract:
This paper presents a method to safeguard stored data integrity from attacks committed
by insiders. This method forms an additional data security layer to detect and prevent
unauthorized modification to critical configuration and data files. It integrates Biba
strict integrity mandatory access control security policy with the verification by
comparison data integrity assurance method. This proposed layer focuses on
monitoring critical files in order to limits the scope of potential damage resulting from
unattended sessions, and prevents usage of ill-gotten access rights. The paper discusses
consequences of such integration.