Security Models
A properly aligned security model ensures an organization’s valuable assets are protected. There are many different security models, and each serves a specific purpose. Often, an organization will incorporate more than one model, or possibly even create its own.
Review the Bell La Padula model, the Denning Information Flow model, Rushby’s model, the Biba model, and the Clark-Wilson model for security specification from Chapter 2, “Security of Technical Systems in Organizations” of your course textbook, Principles of Information Systems Security.
Create a table in Microsoft Word differentiating the Bell La Padula model, the Denning Information Flow model, Rushby’s model, the Biba model, and the Clark-Wilson model based on the following topics:
Name of the model
Axioms of the model
Level of access of the model
Hierarchy of company model
Whether the model deals with integrity or security (or both)
The overall table should provide enough information so that the purpose of each model can be explained.
Book Reference:
Dhillon, G. S. (2018). Information Security: Text and cases (Edition 2.0). Burlington, VT: Prospect Press..
Article reference:
Anatomy of an attack. available online: http://blogs.rsa. com/anatomy-of-an-attack/, last accessed on 2013-07-17
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
