Business > CASE STUDY > ISSC680 Wk5.docx ISSC680 Week 5 Homework ISSC680 Week 5 Homework This week we have b (All)
ISSC680 Wk5.docx ISSC680 Week 5 Homework ISSC680 Week 5 Homework This week we have been tasked with appraising the various types of Security Architecture & Design models. There is a variety of ... these models that can be discussed, and most include different methods of applying the ISO/OSI security layered model. A few of these models include the Access matrix, the Bell-LaPadula confidentiality model, and the Clark-Wilson integrity model. The Access Matrix is a policy for user authentication, and is used to prevent unauthorized changes being made by otherwise authorized users through the use of object controls. There are four major aspects to an Access Matrix: a list of objects, a list of users, a function T which returns an object s type, and the matrix itself where the objects create the individual columns and the users create each row (Feng, Le, & Scanlon, n.d.). Using such a matrix individual use. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [Show More]
Last updated: 3 years ago
Preview 1 out of 2 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 22, 2021
Number of pages
2
Written in
All
This document has been written for:
Uploaded
Jul 22, 2021
Downloads
0
Views
43
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·