Question

In: Computer Science

Research, select and describe, in your view, the best Security Model found

Research, select and describe, in your view, the best Security Model found

Solutions

Expert Solution

Answer:- the best security model is

Bell-LaPadula

This Model was invented by Scientists David Elliot Bell and Leonard .J. LaPadula.Thus this model is called the Bell-LaPadula Model. This is used to maintain the Confidentiality of Security. Here, the classification of Subjects(Users) and Objects(Files) are organized in a non-discretionary fashion, with respect to different layers of secrecy.

It has mainly 3 Rules:

  • SIMPLE CONFIDENTIALITY RULE: Simple Confidentiality Rule states that the Subject can only Read the files on the Same Layer of Secrecy and the Lower Layer of Secrecy but not the Upper Layer of Secrecy, due to which we call this rule as NO READ-UP
  • STAR CONFIDENTIALITY RULE: Star Confidentiality Rule states that the Subject can only Write the files on the Same Layer of Secrecy and the Upper Layer of Secrecy but not the Lower Layer of Secrecy, due to which we call this rule as NO WRITE-DOWN
  • STRONG STAR CONFIDENTIALITY RULE: Stong Star Confidentiality Rule is highly secured and strongest which states that the Subject can Read and Write the files on the Same Layer of Secrecy only and not the Upper Layer of Secrecy or the Lower Layer of Secrecy, due to which we call this rule as NO READ WRITE UP DOWN

The Bell-LaPadula Confidentiality Model is a state machine–based  multilevel security policy. The model was originally designed for military applications. State machine models define states with current permissions and current instances of subjects accessing the objects. The security of the system is satisfied by the fact that the system transitions from one secure state to the other with no failures.

The model uses a layered classification scheme for subjects and a layered categorization scheme for objects. The classification level of the objects and the access rights of the subjects determine which subject will have authorized access to which object. This layered structure forms a lattice for manipulating access.

The Bell-LaPadula Confidentiality Model is a static model, which assumes static states. It implements mandatory access control (MAC) and discretionary access control (DAC)


Related Solutions

Describe your view on the future of the Social Security Program. How do you think this...
Describe your view on the future of the Social Security Program. How do you think this program will look in 20 years? Explain.
select a model or theory of individual health behavior and describe an example from the research...
select a model or theory of individual health behavior and describe an example from the research literature as to how this model has been applied in public health practice. why was this model or theory appropriate for this example? is there another model or theory that could also be appropriate for the health behavior
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls.
Security Mitigation Plan discuss the following Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine authentication strategy. Determine intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures. Develop education plan for employees on security protocols and appropriate use. Provide risk response. Avoidance Transference Mitigation Acceptance Address change Management/Version Control. Outline acceptable use of organizational assets and data. Present employee policies (separation of duties/training). Explain incident response. Incident types/category definitions Roles and responsibilities Reporting requirements/escalation Cyber-incident response...
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls....
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine an authentication strategy. Determine an intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures.
Select a cultural competency model below that best supports Indian Culture, and explain why the model...
Select a cultural competency model below that best supports Indian Culture, and explain why the model was selected. Use the model to address techniques and challenges in providing culturally competent health care/services to your specific population. ■Berlin and Fowkes’ LEARN model (Effective Communication) - Created as a tool to improve communication in patient-physician interactions.Supplement to history taking. ■Cross Cultural Competence Continuum (Developmental) ■Campinha-Bacote (Developmental) - the framework of cultural competence is defined in the process of cultural competence in the...
Types of Tests. For each of the research studies below, select the statistical test that best...
Types of Tests. For each of the research studies below, select the statistical test that best answers the question. Do not attempt to answer the research questions. On average, do people run a mile faster in the morning before breakfast than they do in the evening after supper? Is there a difference in level of happiness measured by the number of times laughed per day among people living in various regions of the US: Northeast, West, Mid-West, or South? A...
discuss which is best qualitative research or quantitative research. describe the key elements of each and...
discuss which is best qualitative research or quantitative research. describe the key elements of each and the conditions that suggest their use
Describe with examples, the various layers of security that are critical to your security plan policy.
Describe with examples, the various layers of security that are critical to your security plan policy.
1. List the best practices for a corporate password security policy. 2. List and describe the...
1. List the best practices for a corporate password security policy. 2. List and describe the best practices for a corporate password security policy. 3. List and describe the best practices for a corporate physical security policy. 4. List and describe the best practices for a corporate digital security policy. 5. List and describe the best practices for a corporate printer security policy.
Please select any nursing research article from any one of the scientific journals found in the...
Please select any nursing research article from any one of the scientific journals found in the Nursing-Related Databases and Journalslist. Select an article from an area that you are interested in or from the field you are working in. The article must be a peer-reviewed research report that was published in the last 5 years. Using the article selected, construct a critique of the article, 6 to 10 pages
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT