Question Description
You will explore a security model. All of them will provide a better understanding of how security enters into computer architectures and operating system design.
Question) Choose one of the models below providing a minimum of 4 pages (not including the title page, abstract, conclusion and reference page): History of the model, How is the model implemented, what are the known barriers, how to bypass barriers and other pertinent information.
1)Trusted computing base
2)State machine model
3)Information flow model
4)Noninterference model
5)Take-Grant model
6)Access control matrix
7)Bell-LaPadula model
8)Biba model
9)Clark-Wilson model
10)Brewer and Nash model (also known as Chinese Wall)
11)Goguen-Meseguer model
12)Sutherland model
13)Graham-Denning model
Requirements:
- APA Format 7th edition
- 4 -page Minimum (not including the Title page, Abstract, Conclusion and Reference page)
- In-text citations
- References
- No plagiarism
- TB attached for references (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide