Verified Document

Security Architecture & Design Models: Article Review

The following are the security models in use. Lattice Models

This security model is based on a mathematical construct that is hugely base don the group notion. It has a set of elements, a partial ordering relations and combines both multilateral and multilevel security.It is used for access control and is mainly use din the military (Landwehr,1981,p.253).

Noninterference Models

This is a very a strict multilevel security policy model that is used for ensuring information confidentiality (McLean,1984).

Bell -- LaPadula Confidentiality Model

This is a confidentiality model that is part and parcel of the state machine-based multilevel security policy. It was originally designed for military use.It defined states woth the current permissions as well as current instances of the subjects that are accessing the objects. The system's security is satisfied by the very fact that the transitions of the systems from one secure state to the next happens without failure. It employs a layered classification scheme for the subjects as well as a layered categorization scheme for the system objects (Balon & Thabet,2004).This model imposes confidentiality but not integrity.

Biba Integrity Model

This is a formal state transition model that describes a set of access control rules that are designed to bring about data integrity. The subjects and data are grouped into ordered security levels...

In other words, it enforces integrity policies to the system.
Clark -- Wilson Integrity Model

This model is used to specify ways of protecting information against any sort of unauthorized modification (Xu,2009).

References

Balon, N, Thabet, I (2004). The Biba Security Model.v.Winter 2004 http://nathanbalon.net/projects/cis576/Biba_Security.pdf

Harris, S (2010).CISSP All-in-One Exam Guide, Sixth Edition. McGraw-Hill Osborne Media

Landwehr, CE (1981).Formal Models for Computer Security. Computing Surveys .Vol 13 (3)

McLean, John (1994). "Security Models." Encyclopedia of Software Engineering. 2. New York: John Wiley & Sons, Inc. pp. 1136 -- 1145.

Simhadi, H (202). Application Security Architecture. GSEC Practical Requirements (v1.4b) (August 2002).

http://www.giac.org/paper/gsec/2720/application-security-architecture/104640

Thorn, a et al. (2008).What is a Security Architecture? Information Security Society Switzerland. http://www.isss.ch/fileadmin/publ/agsa/Security_Architecture.pdf

Xu, Q (2009). Configuring Clark-Wilson Integrity Model to Enforce Flexible Protection. Computational Intelligence and Security. International Conference on Computing & Processing (Hardware/Software)

Sources used in this document:
References

Balon, N, Thabet, I (2004). The Biba Security Model.v.Winter 2004 http://nathanbalon.net/projects/cis576/Biba_Security.pdf

Harris, S (2010).CISSP All-in-One Exam Guide, Sixth Edition. McGraw-Hill Osborne Media

Landwehr, CE (1981).Formal Models for Computer Security. Computing Surveys .Vol 13 (3)

McLean, John (1994). "Security Models." Encyclopedia of Software Engineering. 2. New York: John Wiley & Sons, Inc. pp. 1136 -- 1145.
http://www.giac.org/paper/gsec/2720/application-security-architecture/104640
Thorn, a et al. (2008).What is a Security Architecture? Information Security Society Switzerland. http://www.isss.ch/fileadmin/publ/agsa/Security_Architecture.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Management Strategies for Increasing Security Employee
Words: 2501 Length: 8 Document Type: Essay

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Architecture of the Mind Sight
Words: 1572 Length: 5 Document Type: Essay

We are much less active in our perception of smell, touch, sound, and taste. The other four senses are spontaneous and static, whereas the sense of sight is controllable and dynamic. For example, we cannot control our experience of a scent by focusing our noses, we can only control it by terminating the experience completely, e.g. covering our noses or moving out of the scent's range. Sound also has

Architecture & Behavior Architecture Behavior There Is
Words: 1457 Length: 5 Document Type: Essay

Architecture & Behavior Architecture Behavior There is little question but that architecture is a regulator of human behavior. What sites and facilities look like and function as play key roles in the way people respond to and even participate in what they have to offer. The emergence of a number of fields of study on issues as diverse as health care practices and the habits of crime and safety as well as

Lesson Plan Amp; Reflection I Didn't Know
Words: 857 Length: 3 Document Type: Essay

Lesson Plan Amp; Reflection I didn't know what state you are in so was unable to do state/district standards! Lesson Plan Age/Grade Range; Developmental Level(s): 7-8/2nd Grade; Below grade level Anticipated Lesson Duration: 45 Minutes Lesson Foundations Pre-assessment (including cognitive and noncognitive measures): All students are reading below grade level (5-7 months) as measured by standardized assessments and teacher observation Curricular Focus, Theme, or Subject Area: Reading: Fluency, word recognition, and comprehension State/District Standards: Learning Objectives: Students will develop

Branding New Service Dominant Logic
Words: 12522 Length: 50 Document Type: Dissertation

Branding in Service Markets Amp Aim And Objectives Themes for AMP Characteristics Composing Branding Concept Branding Evolution S-D Logic and Service Markets Branding Challenges in Service Markets Considerations for Effective Service Branding Categories and Themes Branding Theory Evolution S-D Logic and Service Markets Branding Challenges in Service Markets Considerations for Effective Service Branding Branding Concept Characteristics Characteristics Composing Branding Concept Sampling of Studies Reviewed Evolution of Branding Theory Evolution of Marketing Service-Brand-Relationship-Value Triangle Brand Identity, Position & Image Just as marketing increasingly influences most aspects of the consumer's lives, brands

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now