Security Models

In information security, models provide a way to formalize security policies. Such models can be abstract or intuitive. All models are intended to provide an explicit set of rules that a computer can follow to implement the fundamental security concepts, processes, and procedures that make up a security policy. The models offer a way to deepen your understanding of how a computer operations system should be designed and developed to support a specific security policy. No system can be totally secure; security professionals have several security models to consider.  
Let’s say you work for one of the following types of industry: 

  • Manufacturing 
  • Government 
  • Research 
  • Service 
  • Consulting 

Choose a different industry than from last week’s discussion, and then from the list below, select a model and summarize the model as you understand it. State why you might use this model in your job. Get custom essay samples and course-specific study resources via course hero homework for you service – Include at least one advantage and disadvantage of the model you’ve chosen. Get custom essay samples and course-specific study resources via course hero homework for you service – Include a real-life example of the model in use.  

Make sure to include any special or unique security feature for the model.   

NOTE:  Never provide more security than is required so be careful to analyze the requirements of your choice in industry.  Would you put a fence around your house, or would you put a mote with piranha around your house?

  • Trusted computing base 
  • State machine model 
  • Information flow model 
  • Noninterference model 
  • Take-Grant model 
  • Access control matrix 
  • Bell-LaPadula model 
  • Biba model 
  • Clark-Wilson model 
  • Brewer and Nash model (also known as the Chinese wall) 
  • Goguen-Meseguer model 
  • Sutherland model 
  • Graham-Denning model  
Published by
Ace Tutors
View all posts