Security Models
In information security, models provide a way to formalize security policies. Such models can be abstract or intuitive. All models are intended to provide an explicit set of rules that a computer can follow to implement the fundamental security concepts, processes, and procedures that make up a security policy. The models offer a way to deepen your understanding of how a computer operations system should be designed and developed to support a specific security policy. No system can be totally secure; security professionals have several security models to consider.  
Let’s say you work for one of the following types of industry: 

Manufacturing 
Government 
Research 
Service 
Consulting 

Choose a different industry than from last week’s discussion, and then from the list below, select a model and summarize the model as you understand it. State why you might use this model in your job. Get custom essay samples and course-specific study resources via course hero homework for you service – Include at least one advantage and disadvantage of the model you’ve chosen. Get custom essay samples and course-specific study resources via course hero homework for you service – Include a real-life example of the model in use.  

Make sure to include any special or unique security feature for the model.   
NOTE:  Never provide more security than is required so be careful to analyze the requirements of your choice in industry.  Would you put a fence around your house, or would you put a mote with piranha around your house?

Trusted computing base 
State machine model 
Information flow model 
Noninterference model 
Take-Grant model 
Access control matrix 
Bell-LaPadula model 
Biba model 
Clark-Wilson model 
Brewer and Nash model (also known as the Chinese wall) 
Goguen-Meseguer model 
Sutherland model 
Graham-Denning model  

Published by
Ace Tutors
View all posts