Security Models

0 comments

7 pages double space, 12 font, 1″ margins, Times New Roman ,APA7 format.

Security Models

Compare and contrast the following nine security models:

– Access Control Matrix

– Access Control List (ACL)

– Graham-Denning

– Harison-Ruzzo-Ullman (HRU) (Capability Tables)

– Information Flow Model

– Bell-LaPadula

– Biba

– Rule-set Based Access Control (RBAC)

– Role-based Access Control (RBAC)

Include references, Introduction and a conclusion.

At the end, be sure to address the following four topics, each under its own heading.

1. Is one framework better (i.e., more effective) than the others?

2. Give an example of how the implementation of any one of these frameworks would have prevented a recent cyber attack in the news.

3. Are any better suited to MAC? To DAC?

4. Explain which one would work best for your workplace organization.

Take care to explain and justify your answers.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}