Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

4. Many law firms utilize case-tracking systems. Big law firms utilize such systems for billing and file sharing, while smaller ones utilize email for everything,

image text in transcribed

4. Many law firms utilize case-tracking systems. Big law firms utilize such systems for billing and file sharing, while smaller ones utilize email for everything, as case tracking systems get very expensive. These systems may not be secure, as everyone often has access to more files than needed. It may pose a conflict of interest if, for example, a company works for multiple clients that have such a conflict. The figure below represents a policy of an imaginary law firm. The left-hand side is a user/user attribute hierarchy (attorneys, human resources, etc.), while the right-hand side is an object attribute hierarchy (cases, client information). The policy has several flaws, and your goal is to identify them before grave harm occurs. requirements are as follows: 1. HR can hire employees (lawyers and interns) and fire anyone except another HR. 2. Attorneys and Lead Attorneys can create and delete cases, as well as read and modify them. Attorneys cannot work on multiple cases involving the same people. 3. Interns can read only the general information regarding cases they help with. Any access beyond the above requirements is considered an escalation of privilege, a flaw you need to identify. If an entity does not have the access outlined in 1-3 required to perform its duties, it leads to a denial of service, which is also a flaw you need to identify. You need to identify 5 unique flaws for full credit. Choose the most significant flaws. 4.1 Fill the table below (add rows as needed). One example is provided (10 Points). 4 4.2 Based on the above table, propose a new design for the access control policy that addresses the issues of the original policy. You may draw it by hand, with any tool (e.g., draw.io), or using MS word. Discuss how your design addresses the flaws. You may not use prohibitions (16 points)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions