Provide way to formalize security policies

Assignment Help Basic Computer Science
Reference no: EM132749880

In information security, models provide a way to formalize security policies. Such models can be abstract or intuitive. All models are intended to provide an explicit set of rules that a computer can follow to implement the fundamental security concepts, processes, and procedures that make up a security policy. The models offer a way to deepen your understanding of how a computer operations system should be designed and developed to support a specific security policy. No system can be totally secure; security professionals have several security models to consider. 

Let's say you work for one of the following types of industry:

Manufacturing

Government

Research

Service

Consulting

Choose a different industry than from last week's discussion, and then from the list below, select a model and summarize the model as you understand it. State why you might use this model in your job. Include at least one advantage and disadvantage of the model you've chosen. Include a real-life example of the model in use. 

Make sure to include any special or unique security feature for the model.

Trusted computing base

State machine model

Information flow model

Noninterference model

Take-Grant model

Access control matrix

Bell-LaPadula model 

Biba model

Clark-Wilson model

Brewer and Nash model (also known as the Chinese wall)

Goguen-Meseguer model

Sutherland model

Graham-Denning model

Reference no: EM132749880

Questions Cloud

Can business culture be managed : Can business culture be managed? If so, how? Give an example
Develop a personal operative paradigm : Develop a personal "operative paradigm" based on a review of the paradigmatic assumptions and concepts involved in each of the three basic methodological.
Find and determine the participation in the year net income : Determine their participation in the year's net income of $136,000. Beau Dawson and Willow McDonald formed a partnership, investing $276,000 and $92,000
Difference between data analytics and data science : Research on the difference between Data Analytics and Data Science and describe in your words. Find 15 or more analytics / data science related job titles.
Provide way to formalize security policies : In information security, models provide a way to formalize security policies. Such models can be abstract or intuitive
The importance of security awareness training : What risks do such assumptions pose? Moreover, what other risks might we speculate there are in the organization?
Compare gdpr and coppa privacy regulations : Compare and contrast GDPR and COPPA privacy regulations. In your initial post include 2 articles to support your views on the differences and similarities
Many historical events are part of evolution in data : Many historical events are part of the evolution in data. What inventor and creation from that inventor, based on your reading,
Conceptual look at data governance processes : With this framework in mind that allows for a conceptual look at data governance processes, rules, and people requirements identify

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identify organizations that may be susceptible

Acts considered cyberterrorism and / or information warfare can be divided into four separate categories; infrastructure attacks, information attacks, technological facilitation, and promotion.

  Human threats are the most difficult to control and predict

Human Threats Are The Most Difficult To Control And/Or Predict. Role and history of the person with the compromised organization

  Begin by constructing a time line

A project has an initial cost of $54,150, expected net cash inflows of $15,000 per year for 12 years, and a cost of capital of 10%.

  Elements that directly support brand identity

Elements that Directly Support Brand Identity: Select the item that does NOT belong in this set

  What strategy should be selected

If the project manager is a pessimist and does not have the option of strategy S5, what risk would be taken?

  Result of having additional competitors

What would be the likely result of having additional competitors in your industry in the long run?

  Objectively written approach is more appropriate

Objectively written approach is more appropriate or even critical for establishing credibility so that your audience will listen and get informed.

  Affect the standards for network security

What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security?

  Good quality clustering in terms of cohesiveness

What do we aim for to have a good quality clustering in terms of Cohesiveness, and Distinctiveness?

  Is the eu as economically powerful as the united states

Is the EU as economically powerful as the United States? Do you think the EU will ever be as militarily powerful as the United States? What are your thoughts?

  Design access system

If you were going to design an access system that would control people getting into your favorite or most valued items

  Who will be responsible for monitoring and editing the site

Who will be responsible for monitoring and editing the site? What types of content would you remove from the site?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd