Re: [CCCure CISSP] CISSPstudy Digest, Vol 60, Issue 50

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view

Re: [CCCure CISSP] CISSPstudy Digest, Vol 60, Issue 50

Maynard, David C - GMRT-EST
I was wondering about that question as well..

From CISSP AIO 6th edition by Shon Harris

As a security administrator you might configure user profiles so that users cannot change the system's time, alter system configuration files, access a command prompt, or install unapproved applications. This type of access control is referred to as nondiscretionary, meaning that access decisions are not made at the discretion of the user. Nondiscretionary access controls are put into place by an authoritative entity (usually a security administrator) with the goal of protecting the organization's most critical assets.

Users are given a security clearance (secret, top secret, confidential, and so on), and data is classified in the same way. The clearance and classification data are stored in the security labels, which are bound to the specific subjects and objects. When the system makes a decision about fulfilling a request to access an object, it is based on the clearance of the subject, the classification of the object, and the security policy of the system. The rules for how subjects access objects are made by the organization's security policy, configured by the security administrator, enforced by the operating system, and supported by security technologies.


David Maynard - MCSE, CCNA, CCNA Security, Security+, A+

-----Original Message-----
From: CISSPstudy [mailto:[hidden email]] On Behalf Of [hidden email]
Sent: Tuesday, June 11, 2013 11:00 AM
To: [hidden email]
Subject: CISSPstudy Digest, Vol 60, Issue 50

Send CISSPstudy mailing list submissions to
        [hidden email]

To subscribe or unsubscribe via the World Wide Web, visit
or, via email, send a message with subject or body 'help' to
        [hidden email]

You can reach the person managing the list at
        [hidden email]

When replying, please edit your Subject line so it is more specific than "Re: Contents of CISSPstudy digest..."

Today's Topics:

   1. MAC VS NON DAC (waleed zidan)


Message: 1
Date: Tue, 11 Jun 2013 11:00:22 +0400
From: waleed zidan <[hidden email]>
To: [hidden email]
        <[hidden email]>
Content-Type: text/plain; charset="iso-8859-1"

in the question number 877 it say :
What security model implies a central authority that determines what subjects can have access to what objects?

and the answer is non dac , but mac also use central policy controlled by system administrator so please advice

Eng. Mohamed Waleed Zidan
IT  Engineer
CCIE Security ID 36851
CCNP, CCSP,Mitel Certified
Mob: +971 55 1566719
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>


Subject: Digest Footer

You can search through the mailing list archive at:

CISSPstudy mailing list
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:


End of CISSPstudy Digest, Vol 60, Issue 50

This message, and any attachments, is for the intended recipient(s) only, may contain information that is privileged, confidential and/or proprietary and subject to important terms and conditions available at   If you are not the intended recipient, please delete this message.

You can find the list archive at:

CISSPstudy mailing list
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below: