Security Models
In information security, models provide a way to formalize security policies. Such models can be abstract or intuitive. All models are intended to provide an explicit set of rules that a computer can follow to implement the fundamental security concepts, processes, and procedures that make up a security policy. The models offer a way to deepen your understanding of how a computer operations system should be designed and developed to support a specific security policy. No system can be totally secure; security professionals have several security models to consider.
Let’s say you work for one of the following types of industry:
Manufacturing
Government
Research
Service
Consulting
Choose a different industry than from last week’s discussion, and then from the list below, select a model and summarize the model as you understand it. State why you might use this model in your job. Get custom essay samples and course-specific study resources via course hero homework for you service – Include at least one advantage and disadvantage of the model you’ve chosen. Get custom essay samples and course-specific study resources via course hero homework for you service – Include a real-life example of the model in use.
Make sure to include any special or unique security feature for the model.
NOTE: Never provide more security than is required so be careful to analyze the requirements of your choice in industry. Would you put a fence around your house, or would you put a mote with piranha around your house?
Trusted computing base
State machine model
Information flow model
Noninterference model
Take-Grant model
Access control matrix
Bell-LaPadula model
Biba model
Clark-Wilson model
Brewer and Nash model (also known as the Chinese wall)
Goguen-Meseguer model
Sutherland model
Graham-Denning model