Security Architecture & Design Models: Article Review

Total Length: 889 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

A security policy is indicated by Harris (2010) to be a set of rules as well as practices that dictates how sensitive information is to be protected, managed as well as distributed while a security model is a mere symbolic representation of the security policy. The following are the security models in use.

Lattice Models

This security model is based on a mathematical construct that is hugely base don the group notion. It has a set of elements, a partial ordering relations and combines both multilateral and multilevel security.It is used for access control and is mainly use din the military (Landwehr,1981,p.253).

Noninterference Models

This is a very a strict multilevel security policy model that is used for ensuring information confidentiality (McLean,1984).

Bell -- LaPadula Confidentiality Model

This is a confidentiality model that is part and parcel of the state machine-based multilevel security policy. It was originally designed for military use.It defined states woth the current permissions as well as current instances of the subjects that are accessing the objects.

Stuck Writing Your "Security Architecture & Design Models:" Article Review?

The system's security is satisfied by the very fact that the transitions of the systems from one secure state to the next happens without failure. It employs a layered classification scheme for the subjects as well as a layered categorization scheme for the system objects (Balon & Thabet,2004).This model imposes confidentiality but not integrity.

Biba Integrity Model

This is a formal state transition model that describes a set of access control rules that are designed to bring about data integrity. The subjects and data are grouped into ordered security levels of integrity (Biba,1977).This model was develop din order to circumvent the weaknesses in Bell -- LaPadula Confidentiality Model's weaknesses. In other words, it enforces integrity policies to the system.

Clark -- Wilson Integrity Model

This model is used to specify ways of protecting information against any sort of unauthorized modification (Xu,2009)......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security Architecture & Design Models " (2012, December 31) Retrieved May 20, 2024, from
https://www.aceyourpaper.com/essays/security-architecture-design-models-77237

Latest MLA Format (8th edition)

Copy Reference
"Security Architecture & Design Models " 31 December 2012. Web.20 May. 2024. <
https://www.aceyourpaper.com/essays/security-architecture-design-models-77237>

Latest Chicago Format (16th edition)

Copy Reference
"Security Architecture & Design Models ", 31 December 2012, Accessed.20 May. 2024,
https://www.aceyourpaper.com/essays/security-architecture-design-models-77237