A properly aligned security model ensures an organization’s valuable assets are protected. There are many different security models, and each serves a specific purpose. Often, an organization will incorporate more than one model, or possibly even create its own.
Review the Bell La Padula model, the Denning Information Flow model, Rushby’s model, the Biba model, and the Clark-Wilson model for security specification from Chapter 3, “Models for Technical Specification of Information Systems Security” of your course textbook, Principles of Information Systems Security.
Create a table in Microsoft Word differentiating the Bell La Padula model, the Denning Information Flow model, Rushby’s model, the Biba model, and the Clark-Wilson model based on the following topics:
- Name of the model
- Axioms of the model
- Level of access of the model
- Hierarchy of company model
- Whether the model deals with integrity or security (or both)
The overall table should provide enough information so that the purpose of each model can be explained.